A technique for discovering valid usernames on a system by analyzing differences in application responses to valid vs. invalid login attempts.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free