Weaponizing Monster for Cookies Attacks
VSRC, 2 years agoSummary To find the weak secret key in web applications, I used cookiemonster during pentests and scout. When a key is leaked, it can makeā¦
Summary To find the weak secret key in web applications, I used cookiemonster during pentests and scout. When a key is leaked, it can makeā¦