1.8Kпросмотров
7.8%от подписчиков
22 марта 2026 г.
Score: 2.0K
😈 Malicious use of OAuth applications. • Network Response Analysis;
• Endpoint Shapes Discovery; - Common Shapes in OAuth 2.0; - Application-Specific Shapes;
• OAuth 2.0 Vulnerabilities; - Open Redirects and Token Theft; - URL-Parameter-Based Open Redirect; - Referer-Based Open Redirect; - Exploiting Redirect Chains; - Long-Lived Tokens; - Insecure Redirects; - Case 1: Attack with URL Parameter; - Prevention: Method 1 - Use White-Listed Domain; - Lack of State Check in OAuth; - Case 1: Attack with State Parameter; - Prevention: Method 1 - Use State Randomize Parameter;
• Creating Malicious OAuth Applications;
• OAuth Security Checklist;
• AUTHENTICATOR Pattern. #OAuth #devsecops