Hacking OAuth 2.0 for Fun and Profit

Hacking OAuth 2.0 for Fun and Profit

Bugcrowd via YouTube Direct link

CODE STEALING - Secret Methodology

18 of 22

18 of 22

CODE STEALING - Secret Methodology

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking OAuth 2.0 for Fun and Profit

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About Me
  3. 3 Agenda
  4. 4 HISTORY OF OAuth
  5. 5 OAuth 2.0 BASICS
  6. 6 HOW OAuth 2.0 WORKS?
  7. 7 AUTHORIZATION CODE GRANT
  8. 8 IMPLICIT GRANT
  9. 9 WHERE OAuth 2.0 IS USED?
  10. 10 ATTACKS ON OAuth 2.0 INTEGRATIONS
  11. 11 TOKEN STEALING - What we do?
  12. 12 TOKEN STEALING - Secret Methodology
  13. 13 Case Study
  14. 14 PROOF OF CONCEPT
  15. 15 CODE STEALING - What we do?
  16. 16 CODE STEALING-Secret Methodology
  17. 17 CSRF - What we do?
  18. 18 CODE STEALING - Secret Methodology
  19. 19 ATTACK WORKFLOW
  20. 20 TOKEN IMPERSONATION - What we do?
  21. 21 TOKEN IMPERSONATION. Secret Methodology
  22. 22 CONCLUSION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.