Exploits Explained: 5 Unusual Authentication Bypass Techniques

https://www.synack.com/blog/exploits-explained-5-unusual-authentication-bypass-techniques/