It is possible to crack the token’s hash and obtain the information it is
masking because it is not generated using a secure cryptographic mechanism.
R224. Use secure cryptographic mechanisms
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.