Broken Access Control Vulnerability: How Hackers Exploit

Поділитися
Вставка
  • Опубліковано 23 гру 2024

КОМЕНТАРІ • 4

  • @anishkusunuri9010
    @anishkusunuri9010 22 дні тому

    Great work on your channel! the way you explained it was so clear and easy to follow. Your hands-on videos are really helpful. Keep it up❣

  • @bhumiputra6108
    @bhumiputra6108 22 дні тому

    3:34 how were you able to decode the JWT Token inline without using Decoder tab?

    • @DevSecHacker
      @DevSecHacker  22 дні тому

      Using keyboard shortcut. Command + shift + B
      I am using MAC