->
Unveiling Oauth for Bug Bounty Hunting
https://www.udemy.com/course/unveiling-oauth-for-bug-bounty-hunting/
learn about oauth ,its misconfigurations and understand oauth attack in real world scenerios

 


oauth is one the most important topic nowadays if you study web applications penetration testing or api security testing or android security testing then the oauth is one of the most common topic,it is popularly used in almost every applications ,vulnerabilities like account takeover are found in oauth misconfigurations,

if you don't know how to go for oauth testing then this course is for you,you will be able to learn different types of attacks possible with oauth with respective misconfiguration and will learn how chaining can be done in oauth with other vulnerabilities,I have demonstrated the oauth misconfiguration using portswigger labs and also discussed the live finding from a bug bounty programme,you can also find similar issues on your programme as well

This is a short course , in this course, you will be going to learn =>

 

  • What is Oauth?

  • Types of Oauth?

  • How does Oauth work?

  • What are oauth misconfigurations?

  • Demonstrations of account takeovers on lab and live cases

  • Analysing oauth flow from developers docs using Postman

  • Analysing how to bypass some of the restrictions and chaining oauth with other vulnerabilities

  • Understanding more business logic misconfiguration collected from various reports and articles.

Unveiling Oauth for Bug Bounty Hunting


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Gamystyle   |  

Information
Members of Guests cannot leave comments.




rss