OAuth2: Exploitation
This video requires PentesterLab PRO
GO PRO
OAuth2: Exploitation
In this video, we cover the exploitation of OAuth2 within the authorization and authentication framework. We demonstrate how to manipulate OAuth2 parameters to redirect users to a malicious server, and ultimately obtain the key for the exercise.