Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

GhostToken - Exploiting Google Cloud Platform to Create Unremovable Trojan Apps

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical security presentation from DEF CON 31 that reveals a zero-day vulnerability in Google Cloud Platform affecting all Google users. Learn about the 'GhostToken' exploit that enables malicious applications to become permanently invisible and unremovable from user accounts while maintaining data access. Dive into the OAuth 2.0 standard fundamentals, including consent mechanisms, scoped authorization, and token types for third-party cloud platform applications. Understand Google's transition to mandatory GCP integration for app development and discover the technical details of how the vulnerability allows attackers to manipulate the app deletion state. Gain insights into detection methods for Google Workspace administrators, best practices for organizations implementing third-party access, and proposed solutions for OAuth standard implementation in major cloud providers. While knowledge of GCP and OAuth 2.0 flows is beneficial, the 24-minute talk provides comprehensive coverage of all necessary concepts.

Syllabus

DEF CON 31 - GhostToken Exploiting Google Cloud Platform to Create Unremovable Trojan Apps - Skverer

Taught by

DEFCONConference

Reviews

Start your review of GhostToken - Exploiting Google Cloud Platform to Create Unremovable Trojan Apps

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.