Open raghavmishra opened 2 years ago
While researching on 2FA auth bypass on onelogin, I found that new endpoints have been introduced. These endpoints are required for onelogin phishing to work. These endpoints are found using burpsuite.
While researching on 2FA auth bypass on onelogin, I found that new endpoints have been introduced. These endpoints are required for onelogin phishing to work. These endpoints are found using burpsuite.