PIN Code Authentication Bypass
While performing a Penetration Test for a web application, an important part is testing the Authentication process. Even if usually it is a standard authentication process or it issues a well-known authentication framework made for security purposes, we still can find vulnerabilities in the implementation of it. For example, applications may rely on client side data [...]