TL;DR ? I signed up using any unclaimed email on application_2 (e.g., victim@example.com) due to no email verification, then logged into the victim's account on application_1 using the SSO feature that allowed me to log in using application_2. Introd...
16 followers
Hey! I'm a 20-year-old security researcher. I work as a Penetration Tester at Cyrex.