r0b0ts
Aug 6, 2024

Authentication is absolutely need to get user's personal data. I marked it for secret. As I said with my drawing, victim access to attacker's malicious server using URL and my exploit code on the malicious server executes with 'victim's authentication token'.

r0b0ts
r0b0ts

Written by r0b0ts

Bug Bounty Hunter | WebApp Security | Korean

No responses yet