Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

PRO
content
medium diffculty Medium difficulty
average completion time icon
Less than an hour average completion time
number of users completed icon
872 users completed this exercise

Course





Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.