Exploiting weak configurations in Amazon Cognito

This blog post talks all about understanding and exploiting weak configuration in Amazon Cognito

To Read Complete Blog Click here 🙌

Pankaj Mouriya
Pankaj Mouriya
Security Analyst | AWS Certified Security - Specialty

I Workout, Diving Deep into K8s, AWS Security My Specialty, Find Bugs in Web Applications and drink lots of coffee.