#NahamCon2024: OAuth Secret | @BugBountyReportsExplained

preview_player
Показать описание
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍

For many hackers, changing the redirect_uri to an attacker-controlled host is the only attack they know. But in 2024 it won't work. We have to work harder - exploit and chain multiple smaller bugs together to get the account takeover. Those chains will be the topic of this talk.

🔗 LINKS:
📖 MY FAVORITE BOOKS:

🍿 WATCH NEXT:

MY OTHER SOCIALS:

WHO AM I?
If we haven't met before, hey 👋! I'm Ben, most people online know me online as NahamSec. I'm a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.
Рекомендации по теме
Комментарии
Автор

18:24 if anyone else was also confused when he says POST-AUTH REDIRECT he is talking about after the Oauth dance is over, he doesnt mean POST based oauth flow.

KarahannAe
Автор

BBRE guy is the only person who cares about eyesight of content consumers, he used large fonts which we can read easily

ZarakKhanNiazi
Автор

Even though the state parameter is present in the request you should always check for CSRF I've found many targets vulnerable to this . Most of the people leave as soon as they see State parameter in the request. This happens because of misconfig in OUath flow where it doesen't validate the state parameter server side . It only checks if it is present or not.

solitude_
Автор

thanks both of you for sharing - great video

Zizo
Автор

most site now uses strict url validation on redirect_uri not even extra dot can be added btw thx greg

heller
Автор

Hey brother can you add these to the playlist

InfoSecIntel
Автор

These techniques will only work in implict flow. 😢

berathacking