In this room, we will learn about different ways website authentication methods can be bypassed, defeated or broken. These vulnerabilities can be some of the most critical as it often ends in leaks of customers personal data.

Task1: Username Enumeration

Task2: Brute Force

Task3: Logic Flaw

Task4: Cookie Tampering