#1
how they use OAuth applications for “malicious use”, vulnerabilities, etc, overall informative content, good day... [Image: pepeglad.png]

BLOG [Image: pepeokay.png]

Table of contents
Network Response Analysis
Endpoint Shapes Discovery
  • Common Shapes in OAuth 2.0
  • Application-Specific Shapes
OAuth 2.0 Vulnerabilities
  • Open Redirects and Token Theft
  • URL-Parameter-Based Open Redirect
  • Referer-Based Open Redirect
  • Exploiting Redirect Chains
  • Long-Lived Tokens
  • Insecure Redirects
  • Case 1: Attack with URL Parameter
  • Prevention: Method 1 - Use White-Listed Domain
  • Lack of State Check in OAuth
  • Case 1: Attack with State Parameter
  • Prevention: Method 1 - Use State Randomize Parameter
Creating Malicious OAuth Applications
OAuth Security Checklist
AUTHENTICATOR Pattern
Problem Statement
Solution
Structure
Dynamics
Reference