📖
NOTES
search
Ctrlk
  • Welcome!
  • Reference
    • Hackingchevron-right
      • Penetration Testing Resources Bookmarkschevron-right
      • Web/App Pentestingchevron-right
      • Port Swiggerchevron-right
        • Access controlchevron-right
        • Authenticationchevron-right
          • Username enumeration via different responses
        • Server-side request forgery (SSRF)chevron-right
        • File Upload Vulnerabilitieschevron-right
        • SQL Injectionchevron-right
      • Burpchevron-right
      • ☁️Cloudchevron-right
      • Networkingchevron-right
      • Hardware Hackingchevron-right
    • HTML/CSS/JAVAchevron-right
    • DataBasechevron-right
    • PYTHON3chevron-right
    • SEOchevron-right
    • Cloudchevron-right
    • Fileschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Referencechevron-right
  2. Hackingchevron-right
  3. Port Swigger

Authentication

Username enumeration via different responseschevron-right
PreviousUser ID controlled by request parameter with password disclosurechevron-leftNextUsername enumeration via different responseschevron-right

Last updated 2 years ago