Exploiting weak configurations in Amazon CognitoLast updated on May 12, 2021 1 min readThis blog post talks all about understanding and exploiting weak configuration in Amazon CognitoTo Read Complete Blog Click here 🙌Pankaj MouriyaSecurity, Platform Engineering | CKA | AWS Certified Security - SpecialtyI Workout, Diving Deep into K8s, AWS Security My Specialty, Find Bugs in Web Applications and drink lots of coffee.