Главная
Study mode:
on
1
Introduction
2
Whats the problem
3
Basic protocol
4
Key idea
5
Consequences
6
Earth
7
Conclusion
8
Implicit Flow
9
Token Type
10
Feedback
11
The Problem
12
Factors
13
App Impersonation Out
14
How to Fix
15
Protection
16
Refresh Token
17
App Impersonation Prevention
18
Programmers are lazy
19
Developers use the right way
20
Facebook
21
App Secret
Description:
Explore the vulnerabilities in OAuth 2.0 implementation for Online Social Networks (OSNs) in this 31-minute Black Hat conference talk. Discover how application impersonation can lead to massive user data leakage, even when best practices are followed. Learn about a proof-of-concept experiment that demonstrates the ability to collect a 100-million-user social graph in just one week for only $150 USD. Understand the root causes of these security issues, including the implicit-authorization-grant flow and bearer-token usage. Examine the consequences of privilege escalation and the urgent need for industrial practitioners to review their API designs. Gain insights into potential solutions, such as providing opt-out mechanisms for certain OAuth features and considering application protection in future protocol designs. Delve into topics like the Implicit Flow, Token Types, and strategies for preventing application impersonation.

How to Leak a 100-Million-Node Social Graph in Just One Week

Black Hat
Add to list
0:00 / 0:00