Главная
Study mode:
on
1
Intro
2
About Me
3
Agenda
4
HISTORY OF OAuth
5
OAuth 2.0 BASICS
6
HOW OAuth 2.0 WORKS?
7
AUTHORIZATION CODE GRANT
8
IMPLICIT GRANT
9
WHERE OAuth 2.0 IS USED?
10
ATTACKS ON OAuth 2.0 INTEGRATIONS
11
TOKEN STEALING - What we do?
12
TOKEN STEALING - Secret Methodology
13
Case Study
14
PROOF OF CONCEPT
15
CODE STEALING - What we do?
16
CODE STEALING-Secret Methodology
17
CSRF - What we do?
18
CODE STEALING - Secret Methodology
19
ATTACK WORKFLOW
20
TOKEN IMPERSONATION - What we do?
21
TOKEN IMPERSONATION. Secret Methodology
22
CONCLUSION
Description:
Explore methods for discovering high-impact vulnerabilities in OAuth 2.0 integrations through this 50-minute conference talk. Delve into the history and basics of OAuth 2.0, understand its various grant types, and learn where it's commonly implemented. Uncover secret methodologies for token stealing, code stealing, CSRF attacks, and token impersonation. Examine real-world case studies, proof of concepts, and attack workflows to enhance your understanding of OAuth 2.0 security. Gain valuable insights into identifying and exploiting vulnerabilities in OAuth 2.0 implementations for ethical hacking and bug bounty purposes.

Hacking OAuth 2.0 for Fun and Profit

Bugcrowd
Add to list
0:00 / 0:00