OAuth2 Predictable State II: Exploitation
This video requires PentesterLab PRO
GO PRO
OAuth2 Predictable State II: Exploitation
In this video, we cover the OAuth2 Predictable State II: Exploitation exercise from the Authorization and Authentication Badge. We demonstrate how to exploit predictable state values in OAuth2 to gain unauthorized access to a victim's account.