Have you ever had trouble with modifying your ANS document while on the go? Well, DocHub has a great solution for that! Access this cloud editor from any internet-connected device. It allows users to Faint token in ANS files rapidly and anytime needed.
DocHub will surprise you with what it provides you with. It has powerful capabilities to make any changes you want to your paperwork. And its interface is so straightforward that the entire process from start to finish will take you only a few clicks.
After you complete modifying and sharing, you can save your updated ANS file on your device or to the cloud as it is or with an Audit Trail that includes all alterations applied. Also, you can save your paperwork in its original version or convert it into a multi-use template - accomplish any document management task from anywhere with DocHub. Subscribe today!
whats going on welcome back i hope everyone is doing well so lets continue with the web fundamentals pathway so far we have arrived or we have completed the uh ssti vulnerability vulnerability now we should be doing the csrf or cross site request forgery but im gonna post on this after the or after we do the json exploitation the reason for that is csrf is very detailed and is how it has many ramifications so i would uh prefer doing the csrf at the very end of the room so now lets talk about json web exploitation uh so basically before we go through the tasks lets first understand what is a json web and see how it works so basically here we have we are giving an example from the room uh let me take a real example actually so what i would do here im gonna go to okay so im gonna log in here with any name so well give it a demo account i just want to grab the decent login okay turn on so as you can see in the request once i have logged in the web application has assigned me a