FOLLOW FLUID ATTACKS
Due to an inadequate configuration, it is possible to enumerate the
application’s valid usernames.
R225. Proper authentication responses
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.