OAuth2: Exploitation

Access to videos for this exercise is only available with PentesterLab PRO
GOPRO
OAuth2: Exploitation
In this video, we cover the exploitation of OAuth2 within the authorization and authentication framework. We demonstrate how to manipulate OAuth2 parameters to redirect users to a malicious server, and ultimately obtain the key for the exercise.