CORS II: Exploitation

image of exercise CORS II: Exploitation
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
CORS II: Exploitation

In this video, we cover the CORS II exercise, demonstrating how to exploit Cross-Origin Resource Sharing (CORS) vulnerabilities. By manipulating the origin header, we show how an attacker can steal sensitive information from a vulnerable web application.

video duration icon09:55 number of views icon2576