Register as a standard user and examine how your credentials are stored. After registration, investigate the cookie storage mechanism for potential serialization vulnerabilities.
Remember: All roles are initially stored with standard privileges regardless of input
Already registered? Proceed to Login Investigation