Unveiling Oauth for Bug Bounty Hunting | Courses | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

Unveiling Oauth for Bug Bounty Hunting

Unveiling Oauth for Bug Bounty Hunting

LV
4
 

mayoufi

Member
Joined
Oct 22, 2023
Threads
2,202
Likes
150
Awards
9
Credits
3,916©
Cash
0$
Th MBldPkCALG8OH5pyHqVG3gpRuGPMvTE7

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 14 Lectures ( 1h 48m ) | Size: 1.1 GB
learn about oauth ,its misconfigurations and understand oauth attack in real world scenerios
What you'll learn
What is oauth?
Types of oauth?
Oauth Misconfigurations with proper explanations
Learning different attacks possible in oauth
Learn chaining oauth with other vulnerabilities like CSRF,HTML injection
Business logic misconfigurations with oauth
Special case of bypassing CORS policy and finally making it to account takeover

Requirements
Good to know basics of burpsuite,postman,some basics of development like HTML,JS
If you haven't explored any of those mentioned above then no issue you can first learn basics of them then you are ready for the demonstrations

Description
oauth is one the most important topic nowadays if you study web applications penetration testing or api security testing or android security testing then the oauth is one of the most common topic,it is popularly used in almost every applications ,vulnerabilities like account takeover are found in oauth misconfigurations, if you don't know how to go for oauth testing then this course is for you,you will be able to learn different types of attacks possible with oauth with respective misconfiguration and will learn how chaining can be done in oauth with other vulnerabilities,I have demonstrated the oauth misconfiguration using portswigger labs and also discussed the live finding from a bug bounty programme,you can also find similar issues on your programme as wellThis is a short course , in this course, you will be going to learn =>What is Oauth?Types of Oauth?How does Oauth work?What are oauth misconfigurations?Demonstrations of account takeovers on lab and live casesAnalysing oauth flow from developers docs using PostmanAnalysing how to bypass some of the restrictions and chaining oauth with other vulnerabilitiesUnderstanding more business logic misconfiguration collected from various reports and articles.Use the tutorials for education purpose only don't misuse it in real worldThanks

Who this course is for
Ethical Hackers
Bug Bounty Hunters
Security Engineers
Red Teamers
Developers
IT analysts
Security Enthusiasts
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips

Similar threads

Top Bottom