Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

PRO
content
medium diffculty Medium difficulty
easy diffculty Less than an hour
average
completion
time
number of users completed icon 724
completed
this exercise

Course





Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.