Cross-Origin Resource Sharing II
This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.
content
average
completion
time
completed
this exercise
Course
Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.