Cross-Origin Resource Sharing II
This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.
You can access the course for this exercise by clicking here
More details on how to access the online version of this exercise can be found here
More details on how to score this exercise can be found here