OAuth2: Exploitation

image of exercise OAuth2: Exploitation
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
OAuth2: Exploitation

In this video, we cover the exploitation of OAuth2 within the authorization and authentication framework. We demonstrate how to manipulate OAuth2 parameters to redirect users to a malicious server, and ultimately obtain the key for the exercise.

video duration icon06:21 number of views icon2066