Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

medium diffculty Medium difficulty
average completion time icon
Less than an hour average completion time
number of users completed icon
872 users completed this exercise


Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.