OAuth2 Predictable State II: Exploitation

Return to Exercise
image of exercise OAuth2 Predictable State II: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
OAuth2 Predictable State II: Exploitation

In this video, we cover the OAuth2 Predictable State II: Exploitation exercise from the Authorization and Authentication Badge. We demonstrate how to exploit predictable state values in OAuth2 to gain unauthorized access to a victim's account.

video duration icon11:05 number of views icon645