CORS II: Exploitation

Access to videos for this exercise is only available with PentesterLab PRO
GOPRO
CORS II: Exploitation
In this video, we cover the CORS II exercise, demonstrating how to exploit Cross-Origin Resource Sharing (CORS) vulnerabilities. By manipulating the origin header, we show how an attacker can steal sensitive information from a vulnerable web application.