OAuth 2.0 Auth Code Injection Attack in Action

OAuth 2.0 Auth Code Injection Attack in Action

OktaDev

4 года назад

9,897 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Kerem Serttas
Kerem Serttas - 19.05.2023 02:02

I have question. If the auth code is for single use. How can both attacker and the target user can use this single use code with the application?

Ответить
Sebastián González
Sebastián González - 08.11.2022 19:43

Very clearly illustrated, thanks for explaining and demoing this!

Ответить
Behrad Kazemi
Behrad Kazemi - 22.08.2022 10:01

thanks

Ответить
Meghna Sharma
Meghna Sharma - 01.07.2021 12:13

Very informative video. Thanks a lot!

Ответить
Kees
Kees - 07.12.2020 12:51

By watching this vid, I became a more informed person: my time was well spent - thx!

Ответить
nawwark
nawwark - 28.05.2020 04:02

Are there other attack scenarios that don't require a malicious browser extensions (or compromised user agent or MITM)? I don't know much about browser extensions, but don't they already have access to cookies, browser storage, and/or the page's DOM? Therefore session hijacking can already be done in different ways at that point?

Ответить
Baptiste
Baptiste - 27.05.2020 11:19

But isn't the back channel supposed to send the code along with some secret to the authorization server of Google ? I thought the need to have a front and a back channel was specifically aimed to prevent this kind of attacks where someone could replay your auth code but as it does not have the client secret the auth server would not grant the access_token.

Ответить
Spencer Davis
Spencer Davis - 26.05.2020 19:28

thanks

Ответить