February 2019
Beginner to intermediate
366 pages
7h 49m
English
Close the session using the logout option, then go to History, and look for a request made while the user was logged in. Right-click on Send to repeater, and, without modifying any value, click on Go to resend the request, as follows:

The result is the application being shown without the user being logged in. So, the application is not vulnerable.
Read now
Unlock full access