Room progress ( 0% )
Task 1Introduction
Task 2Key Concepts
Task 3OAuth Grant Types
Task 4How OAuth Flow Works
Task includes a deployable machine
Task 5Identifying the OAuth Services
Task 6Exploiting OAuth - Stealing OAuth Token
Task 7Exploiting OAuth - CSRF in OAuth
Task 8Exploiting OAuth - Implicit Grant Flow
Task 9Other Vulnerabilities and Evolution of OAuth 2.1
Task 10Conclusion
Ready to learn Cyber Security? Create your free account today!
The OAuth Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in