Course
This course covers the exploitation of an insecure OAuth2 Client that relies on a predictable <code>state</code> parameter. By chaining this with a CSRF vulnerability, you can take over an account linked via OAuth2.
Skills covered
Authentication
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.