In this session we'll discuss unchecked redirects. These make it easy to mask phishing attempts and can even allow violation of authorization constraints.
- Unchecked Redirects
- What they are
- Detection
- Exploitation
- Mitigation
In this session we'll discuss unchecked redirects. These make it easy to mask phishing attempts and can even allow violation of authorization constraints.