Cross-Origin Resource Sharing II
This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.
content
Less than an hour average completion time
872 users completed this exercise
Course
Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.