Stomp credentials are being stored on the front end. I read about stomp and am unsure how to go about exploiting them.
How can I go about learning how to do this?
This is for work btw. Nothing malicious.
[link] [comments]
from hacking: security in practice https://ift.tt/6mDtHO1
Comments
Post a Comment