OAuth2: Exploitation

Return to Exercise
image of exercise OAuth2: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
OAuth2: Exploitation

In this video, we cover the exploitation of OAuth2 within the authorization and authentication framework. We demonstrate how to manipulate OAuth2 parameters to redirect users to a malicious server, and ultimately obtain the key for the exercise.

video duration icon06:21 number of views icon2143