To access material, start machines and answer questions login.
In modern web applications, OAuth vulnerabilities emerge as a serious and frequently disregarded risk; when we talk about OAuth, we're talking about OAuth 2.0, the commonly used authorisation framework. The vulnerabilities occur when hackers take advantage of weaknesses in OAuth 2.0, which allows for , , data leakage and exploitation of other vulnerabilities.
Learning Objectives
- Essential concepts for OAuth 2.0 (Grant Types)
- OAuth 2.0 flow
- Identify OAuth services
- Exploitation techniques
- Evolution of OAuth 2.1
An understanding of the following topics is recommended before starting the room:
Let's begin!
I am ready to start the room.
Ready to learn Cyber Security?
The OAuth Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
