Course
This course focuses on exploiting an insecure OAuth2 Client with a predictable state parameter, demonstrating how to chain vulnerabilities like CSRF to take over accounts. Understanding and identifying such flaws in OAuth2 implementations is crucial due to their widespread use in enterprises.
Skills covered
Authentication
Client Side
Cryptography
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.