Exploiting weak configurations in Amazon Cognito

This blog post talks all about understanding and exploiting weak configuration in Amazon Cognito

To Read Complete Blog Click here 🙌

Pankaj Mouriya
Pankaj Mouriya
Security Analyst

I Workout, Find Bugs in Web Applications and drink a lot of coffee.