Это видео недоступно.
Сожалеем об этом.

HACKING OAuth 2.0 FOR BEGINNERS!

Поделиться
HTML-код
  • Опубликовано: 8 авг 2020
  • I'm a pentester and a bug bounty hunter who's learning everyday and sharing useful resources as I move along. Subscribe to my channel because I'll be sharing my knowledge in new videos regularly.
    SIGN UP ON Intigriti:
    go.intigriti.com/farah
    BUY ME A COFFEE:
    www.buymeacoffee.com/farahhawa
    TIME STAMPS:
    00:00:45 - What is OAuth 2.0?
    00:01:05 - Uses of OAuth 2.0
    00:01:30 - Entities in OAuth 2.0
    00:02:09 - Types of Flows of OAuth 2.0
    00:02:30 - Authorization Code Grant Flow
    00:04:11 - Implicit Grant Flow
    00:05:11 - Practical Exploitation
    00:05:36 - Reusing Access Tokens
    00:07:05 - redirect_uri Not Validated
    00:08:52 - CSRF
    SOCIAL MEDIA:
    Follow me on Twitter: / farah_hawaa
    Follow me on Instagram: / farah_hawaa
    Connect with me on LinkedIn: / farah-hawa-a012b8162
    OAuth 2.0 LAB:
    github.com/koenbuyens/Vulnera...
    OAuth 2.0 RESOURCES:
    www.digitalocean.com/communit...
    tools.ietf.org/html/rfc6749
    auth0.com/docs/api-auth/which...
    alexbilbie.com/guide-to-oauth...
    • LevelUp 0x02 - Hacking...
    Video editor: www.fiverr.com/pixelstudios1

Комментарии • 142

  • @Vinayak123-q8p
    @Vinayak123-q8p 2 года назад +1

    amazing, this could be probably one of the biggest information that i have ever been given..the way how you explain is an amazing..we need such playlist more and more in upcoming days

  • @shubhamghosh2228
    @shubhamghosh2228 4 года назад

    Farah you are doing great! Very informative video. You taught so many things in just 10minutes.

  • @yosoffmalik9135
    @yosoffmalik9135 4 года назад

    You are good with knowledge and theoretical stuff, your videos gets me into reals basics of topics

  • @devvishack641
    @devvishack641 4 года назад

    Aweeome . Just awesome . For noobs like me who are just starting in bug bounty . This is the place where we can learn basics in depth. Thanks .
    Please keep posting more such practical videos .

  • @albertobarbieri8280
    @albertobarbieri8280 3 года назад +1

    Your videos are amazing. Simply to understand and very explicative.

  • @m.waheedanwar7105
    @m.waheedanwar7105 3 года назад

    Beautifully explained hope to get more knowledge from you girl.More power to you

  • @ahaytman
    @ahaytman 3 года назад

    Great work Farah !!!

  • @medioclick
    @medioclick 4 года назад

    once again simple and good explanation.

  • @muizzraheem5937
    @muizzraheem5937 2 года назад

    Have been having issues comprehending Oauth, this video is a problem solver thanks farah ❤️

    • @FarahHawa
      @FarahHawa  2 года назад +1

      You’re welcome 😊

  • @mylyf6684
    @mylyf6684 4 года назад

    I learned something today.💯
    Thanks.

  • @solodancer617
    @solodancer617 4 года назад

    Very good video, presentation is understanding quiet easily.

  • @soufianeamed217
    @soufianeamed217 4 года назад +4

    Yaw Farah This Is Just Awesome, Brief And Useful That's Why I Love What You Are Doing, Keep It Up And Stay Safe .

  • @raselmir1285
    @raselmir1285 3 года назад

    Great job. Thanks man. Now I am clear.

  • @sohamprince1
    @sohamprince1 4 года назад +3

    Awesome.. loved the way you teach the concepts and the labs!! Keep it up!

  • @the_linux_guy1515
    @the_linux_guy1515 4 года назад +11

    People were getting jealous of Bugcrowd sponsoring ...now Intigriti has sponsored ...and soon Hackerone will ...to hell with them 😂😂...keep up the good work 👍🔥

  • @cheffysunnythakkkar7614
    @cheffysunnythakkkar7614 3 года назад

    thank you so much dear for such a wonderful explanation

  • @rayancrasta7460
    @rayancrasta7460 4 года назад +14

    Shez doing a great job on youtube cuz to get sponsors within just

  • @killcode6717
    @killcode6717 2 года назад

    Thanks for the tutorials

  • @ishikasharma1103
    @ishikasharma1103 4 года назад

    Really a good video!

  • @pakflutterdeveloper
    @pakflutterdeveloper 4 года назад

    Excellent work :)

  • @pussycat0x676
    @pussycat0x676 4 года назад

    Awesome work :D

  • @balapraneeth9708
    @balapraneeth9708 3 года назад +1

    Spot on!!. Simply amazing. Thanks for sharing :)

  • @RakeshWaghela
    @RakeshWaghela 3 года назад

    awesome video, keep it up. you earned a sub !

  • @balveersinghbhatia
    @balveersinghbhatia 4 года назад

    Nice work thanks for this video

  • @abhinavkishoregv273
    @abhinavkishoregv273 3 года назад

    nice explanation. Thank you

  • @phitran5164
    @phitran5164 4 года назад

    Nice video, thanks you so much

  • @vasuyadav9171
    @vasuyadav9171 4 года назад +1

    Hi Farah can you please tell the impact of the csrf one and reuse of token and also there severity category?
    Btw nice video

  • @ahjee718
    @ahjee718 3 года назад

    Thank you for this video! Is it possible for you to do a tutorial on how to create a live web server similar to the one you showed in this video that captures vulnerabilities like the OAuth access token?

  • @MohitSharma-xf9wp
    @MohitSharma-xf9wp 3 года назад

    Very much appreciated

  • @swapnilpotbhare888
    @swapnilpotbhare888 4 года назад +6

    Excellent, and very good command over Knowledge

  • @vijaykannanhere
    @vijaykannanhere 4 года назад

    Much Appreicated . :)

  • @InfraHero
    @InfraHero 4 года назад

    Awesome ...!!

  • @ravichhetri8918
    @ravichhetri8918 3 года назад

    Hi Farah, Do you take session on the bypass techniques for Saml, Oauth ,oidc..I am very much interested.

  • @NinjaTech1337
    @NinjaTech1337 4 года назад +3

    Great Teaching Style. Loved Your Contents.🤗

  • @SageTheProfessor
    @SageTheProfessor 4 года назад

    Thank you Farah. Very useful explanation and amazing demos. Keep up the great work.

  • @vaibhav114
    @vaibhav114 2 года назад

    How old are you? Don't think you are out of school yet. But, amazing grasp of the subject. Kudos!!

  • @wiz2398
    @wiz2398 3 года назад

    Bhai yeh kittiiiee Awesome hai.. 😍😘

  • @susovangarai6731
    @susovangarai6731 4 года назад

    Good for beginner like me 👍 .... Please make an advanced level video also

  • @fypage.
    @fypage. 4 года назад

    Wow 10k congrats your channel has grown so fast earlier this year I had like 1 or 2k subs

  • @SumitSingh-xu4qs
    @SumitSingh-xu4qs 3 года назад

    great explain sister

  • @hannanjamil1060
    @hannanjamil1060 4 года назад +1

    Great work Farah!

  • @Sniperrkr
    @Sniperrkr 3 года назад

    Thank you!

  • @chinmay128
    @chinmay128 4 года назад

    can you make a video on your journey of how you became a hacker
    i want to learn to do all of this stuff but really don't know where to start with .please make a video on it.
    and if you can refer to any video on youtube .i mean for learning.

  • @aadarshverma6913
    @aadarshverma6913 4 года назад

    Make more videos please I love them and I want to be just like you

  • @Clo326
    @Clo326 2 года назад

    Sooper videos

  • @jayeshprajapati1396
    @jayeshprajapati1396 4 года назад +1

    Can you make a video on your cyber security journey ??
    ...............................................................
    Video is good👍👍

  • @vishalkothari8065
    @vishalkothari8065 3 года назад

    So if i want to get details of a user on client side of the application using an ajax call and display those same details to the user then it is an authorisation code grant example right?

  • @himanshushekharpandey1519
    @himanshushekharpandey1519 4 года назад +1

    awesome explanation as always :)

  • @adminhackstar3333
    @adminhackstar3333 3 года назад +1

    Make an video on best course for beginners in ethical hacking

  • @gyansoni2667
    @gyansoni2667 4 года назад +2

    Such a nice explanation 👍

  • @sn0xsecurity696
    @sn0xsecurity696 4 года назад +1

    are GAJAB lots of love dear stay safe but kabhi video thoda hindi meh bhi bana dena toh aapke susbcribers bhi jada jldi grow karenge hope u got it my point and thanks for this video.
    by
    @MR CYBERTRON YT

  • @prasantabanerjee1184
    @prasantabanerjee1184 3 года назад

    excellent 🤗

  • @kalyanidudhekar3655
    @kalyanidudhekar3655 4 года назад

    Farah this helps me a lot but can u plzz make a vedio on subdomain takeover

    • @cimihan4816
      @cimihan4816 4 года назад

      ruclips.net/video/67chVkq3g0M/видео.html

  • @joharraza5231
    @joharraza5231 4 года назад

    Excellent work. Very informative. But please don't use music. 👍

  • @mukoshmanob9240
    @mukoshmanob9240 4 года назад

    Plzz make a videp about recon

  • @boneytech3965
    @boneytech3965 3 года назад

    Can you Please upload more about oAuth Vulnerability
    In websites with more detail.

  • @hassan12141
    @hassan12141 4 года назад

    Great job+great content
    I really appreciate her work❤

  • @sudiptapandit4880
    @sudiptapandit4880 4 года назад +2

    Isn't OAuth is for authorization part only? the 'Sign in with' buttons use OpenID Connect protocol not OAuth. Although nowadays people use these terms interchangeably .

    • @FarahHawa
      @FarahHawa  4 года назад

      OpenID Connect is a layer that's built on top of OAuth... you can check this here developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc

    • @sudiptapandit4880
      @sudiptapandit4880 4 года назад

      @@FarahHawa Thanks for clarifying

  • @amarshaikh2147
    @amarshaikh2147 4 года назад +2

    Thanks it's good info for developers as well to improve there application security 🔒🔒🔒 thanks ❤❤❤❤ again.

  • @cyber_tech_404
    @cyber_tech_404 4 года назад

    Love u bro

  • @abhisheksanmare6835
    @abhisheksanmare6835 3 года назад

    hello mam. I have encountered that while signing again, the website is sending an OTP to my previous device, not on my number in the new device. I once had an account on that website that was deleted due to inactivity. is it a flaw to be explored?

  • @cyberUF
    @cyberUF 4 года назад +1

    Hey I learn lot from You !
    Can you create how we exploit dom based xss or any dom based issue

  • @nayeem9358
    @nayeem9358 4 года назад

    Awesome

  • @mr.heretic8192
    @mr.heretic8192 4 года назад +1

    Hey appreciate your skill & teaching skills.....
    I've cleared my 12th, please advise me what should i do to get cyper security

  • @AmanGupta-ho4rh
    @AmanGupta-ho4rh 3 года назад

    I am getting warning as: Warning: missing space before text for line 14 of jade file "/usr/src/app/views/login.jade"
    And not able to authorize the request.
    can someone help me with it please :) ?

  • @faique2995
    @faique2995 4 года назад

    awesome

  • @adityasadhukhan8438
    @adityasadhukhan8438 4 года назад

    Can you help me with resources to study about advanced SQL

  • @cyber__hawk5555
    @cyber__hawk5555 3 года назад

    Which lab are you using ?

  • @graycybermonk3068
    @graycybermonk3068 3 года назад

    Hi, I am your big follower. I have started new in this bounty. Can you tell what about Automated Scans? Every where I got out of scope this Automated Scans. Please I need some help.

    • @FarahHawa
      @FarahHawa  3 года назад +2

      Basically, programs mark automated scans as out-of-scope findings because they create too much noise on the server and result in the discovery of bugs that are known or false positives. It's best to not rely on automated scans for bug bounties.

    • @graycybermonk3068
      @graycybermonk3068 3 года назад

      @@FarahHawa thank for very good reply. Takr my respect. You are like my sister. Really I am appreciate to you and your channel. I started bug bounty. But I am not getting any path how to start. What kind of toolsa I will use? Can you help me little bit. Really I am stuck. Thanks for your reply and respect.

  • @dsdgaming2242
    @dsdgaming2242 4 года назад

    Wow. Such a beauty and skills is just

  • @winklerrr
    @winklerrr Год назад

    Where did you find your information? :)

  • @omerfarooqdemir9907
    @omerfarooqdemir9907 3 года назад

    which ubuntu distribution are you using

  • @pankajholariya8331
    @pankajholariya8331 3 года назад

    thx

  • @shubhamsoni8093
    @shubhamsoni8093 4 года назад

    Great work Farah! So you're from Commerce background how did you come to hacking?

  • @whyrohit4197
    @whyrohit4197 4 года назад +1

    Just wanted to know the specs of your laptop..?? And if you're comfortable,i want to know that..... How you make thumbnails😰😰😰😰😰its looks damn! Cool! :'??

    • @FarahHawa
      @FarahHawa  4 года назад +2

      8gb ram, i5 processor. I do have another laptop with better specs but this one does it for me on most days. Thanks, I use Canva to make thumbnails :)

  • @rishad6324
    @rishad6324 4 года назад

    wow. you are just amazing.

  • @gulhameed1270
    @gulhameed1270 3 года назад

    what if we replace the state parameter value with other account state value,and the account logged in ?. is it still consider as OAuth missconfiguration?

  • @prashantkumar2963
    @prashantkumar2963 4 года назад

    what is your ug course?

  • @sachinmaurya3259
    @sachinmaurya3259 4 года назад

    Love to watch your videos and also learn a lot from your video:)

    • @FarahHawa
      @FarahHawa  4 года назад

      That's great! Thank you for watching!

  • @Bosssssss77777
    @Bosssssss77777 2 года назад

    Please Make Playlist On Bwapp,Dvwa

  • @anabakhtar3774
    @anabakhtar3774 4 года назад

    Really informativel video Farah 💯

    • @FarahHawa
      @FarahHawa  4 года назад +1

      So glad it helped!!

  • @vikasmeshram2515
    @vikasmeshram2515 4 года назад

    I also want to study but didn't found something better.

  • @ganeshnishitha4425
    @ganeshnishitha4425 3 года назад

    nice sister

  • @gowthamvyasmalkari4511
    @gowthamvyasmalkari4511 4 года назад

    Awesome 😊😊.Nice video.
    I too wanna to become bug bounty hunter.
    Which topics should I start to read in web application hackers handbook? and which topics just to leave?
    Please answer.

    • @gowthamvyasmalkari4511
      @gowthamvyasmalkari4511 4 года назад

      Please make a videos on this.Thank u

    • @FarahHawa
      @FarahHawa  4 года назад +1

      Everything up till chapter 13 is mostly relevant

    • @gowthamvyasmalkari4511
      @gowthamvyasmalkari4511 4 года назад

      @@FarahHawa how much time do u think for a beginner to a bug hunter by the resources u mentioned in the first videos.
      How many years took it for u ?

    • @FarahHawa
      @FarahHawa  4 года назад +2

      @@gowthamvyasmalkari4511 you can do it in a few months tbh. I was doing a little bit of coding, reading handbook, labs and blogs everyday. Give 1-2 hours to each resource and you can be done in 2-3 months if you're a fast learner.

    • @AkashHamal0x01
      @AkashHamal0x01 4 года назад

      @@FarahHawa hi farah u havent hunted a single bug .U will face massive trolling

  • @RelaxMusic2zero23
    @RelaxMusic2zero23 4 года назад +1

    the best source(it may piad too) learn hacking and related, and where you learn all these things

  • @jakianam9554
    @jakianam9554 4 года назад

    You should add subtitles

  • @itszabbs1740
    @itszabbs1740 4 года назад

    Nice video . You have helped me a lot .

  • @bharathpatel1757
    @bharathpatel1757 4 года назад

    Hi dhidhi . I'm completely a zero level beginner intrested in learning about ethical hacking and I was on search of finding people who could suggest me possible ways of learning things from beginning and I found your profile in linkedin . Please could you suggest me some youtube tutorial for learning hacking from very basic level .

    • @FarahHawa
      @FarahHawa  4 года назад +1

      ruclips.net/channel/UCPiN9NPjIer8Do9gUFxKv7A , ruclips.net/channel/UCQN2DsjnYH60SFBIA6IkNwg and ruclips.net/channel/UCCZDt7MuC3Hzs6IH4xODLBw are all great

    • @bharathpatel1757
      @bharathpatel1757 4 года назад

      @@FarahHawa thank you ! So much

  • @Manik-Atri-Short
    @Manik-Atri-Short 3 года назад

    Please make hindi vedio

  • @vikasmeshram2515
    @vikasmeshram2515 4 года назад

    Apne hacking kaha se sikha ??

  • @JasonGomes140294
    @JasonGomes140294 4 года назад

    Well Explained!!! Why do you use ubuntu instead of kali linux??

    • @FarahHawa
      @FarahHawa  4 года назад +1

      thank you! I use both, but the lab required Docker and that's set up on my Ubuntu box.

    • @JasonGomes140294
      @JasonGomes140294 4 года назад

      @@FarahHawa ohk nice. Waiting for the next series of vdos. keep 'em coming

  • @rutwikhiwalkar9583
    @rutwikhiwalkar9583 4 года назад +3

    Not a fan of the background music Farah. Great video tbh!

  • @merchant1998
    @merchant1998 3 года назад

    Hello, I need your help please

  • @amolgangurde5714
    @amolgangurde5714 4 года назад

    Nice explanation, keep sharing 👌

  • @playforpassion7111
    @playforpassion7111 4 года назад +1

    Can someone explain the impact of reusing access tokens?

  • @hikefka8001
    @hikefka8001 2 года назад

    👏👏👩‍💻🧙‍♀

  • @l1f07bscs0035
    @l1f07bscs0035 3 года назад

    an awesome detailed written guide here decatechlabs.com/oauth2-explained-and-how-oauth2-works-oauth-in-action

  • @ansanbinoy5949
    @ansanbinoy5949 4 года назад

    😍😘

  • @unknown_3293
    @unknown_3293 Год назад

    ☕☕☕☕

  • @Sham-xg9kd
    @Sham-xg9kd 4 года назад +1

    Your great in teaching ... Cyber security researcher

    • @FarahHawa
      @FarahHawa  4 года назад +1

      Thank you so much!!