How to Hack OAuth

  Рет қаралды 44,098

OktaDev

OktaDev

Күн бұрын

Пікірлер: 60
@lilyrosestracke4591
@lilyrosestracke4591 3 жыл бұрын
This is the most informative video on OAuth I've ever seen, from the authoritative source. Well done.
@CrazyFarseer
@CrazyFarseer 4 жыл бұрын
Your OAuth analogies in the beginning are really, really helpful!
@mccannhealthcompany8625
@mccannhealthcompany8625 4 жыл бұрын
All thanks to expeditetools com i received a hacked transfer of $34,000 .They are awesome.
@munisharya3797
@munisharya3797 4 жыл бұрын
i usually don't comment. But this video i can't resist . Amazing explanation. Too good. Thanks for lighting the path...
@threemr01
@threemr01 Жыл бұрын
Fantastic explanations, Aaron!! Thank you very much. They were extremely helpful and I appreciate you took the time to review the jargon and still simplify the language during the explanation.
@No1CanGetMe
@No1CanGetMe Жыл бұрын
After watching this video, I am not the same person anymore. Thank you.
@samkachar
@samkachar 2 жыл бұрын
As of today this only has 25k views. That seems on par to a war crime. Great video and the editing was done fairly well. The cut that was done toward the end was terrible however.
@nathansherrard4111
@nathansherrard4111 4 жыл бұрын
Awesome presentation - I really understood all those OAuth headlines from 2017 better now! However, was there something cut at the @22:25 mark? Seems to jump ahead and missed his intro to the View As feature...
@aaronpk
@aaronpk 4 жыл бұрын
oh no, you're right! I'm not sure how that got lost! It was supposed to be an explanation of the "View As" feature!
@OktaDev
@OktaDev 4 жыл бұрын
"Facebook had this great feature called 'View As'. You could be on your profile page and click View As and see what your profile looked like to someone else." was the sentence missing from the edit
@nathansherrard4111
@nathansherrard4111 4 жыл бұрын
Thanks for filling in that missing piece! (and quickly)
@huizhao2050
@huizhao2050 2 жыл бұрын
Can you please define what is the back channel and front channel? I can't find them online.
@JW-qd3ol
@JW-qd3ol Жыл бұрын
That was super interesting!!! Thank you!!
@OktaDev
@OktaDev Жыл бұрын
Glad you enjoyed it!
@tanveer867
@tanveer867 4 жыл бұрын
Wonderful Explanation. Thanks for taking time and explaining this.
@michaelfournier4996
@michaelfournier4996 2 жыл бұрын
Thanks for this easy to understand explanation.
@mryildiz702
@mryildiz702 2 жыл бұрын
It's a really good video. Also, bought your Udemy course. I think I'm gonna learn a lot from you :)
@michellewang3286
@michellewang3286 4 жыл бұрын
Hello, can you explain more about ''Front channel benefits: application without public ip can receive data'' Thank you!!
@MarkusSchaber
@MarkusSchaber 4 жыл бұрын
Around 10:00 to 10:10: Why don't users have access to the source code of web based apps? It's JavaScript files which can be downloaded using tools like wget or inspect it on the fly using the developer tools provided by browsers.
@aaronpk
@aaronpk 4 жыл бұрын
That should have been specifically web-*server* based apps, like the traditional way of developing apps before SPAs became popular... server-side languages like .NET, Java, PHP, etc.
@MarkusSchaber
@MarkusSchaber 4 жыл бұрын
@@aaronpk Ah, so its the server calling to the other server, I see. :-)
@johntrent018
@johntrent018 2 жыл бұрын
I'm not confirming anything right now as I'm still learning but I've made a first test of Google oauth2 connection through a ReactJS SPA and I've been able to get data from Google and client secret isn't even mentioned in source files, only client id. It's the Google auth server who will check for this. I may say mistakes as I'm still learning
@iamxerosugar
@iamxerosugar 4 жыл бұрын
Supercool presentation!!
@YeeModz
@YeeModz 4 жыл бұрын
ive recreated it but I dont figure out how to acess there account need help i mean how to connect my acc with theres
@limitless707
@limitless707 5 ай бұрын
How do you know if aomeone has oauth?
@AlphaCybersecurity
@AlphaCybersecurity 4 жыл бұрын
Thank you for this explanation. Clear and easy to understand!
@1nf0calypse
@1nf0calypse 2 жыл бұрын
. I. Ziemlich z ??.?? ?I ended this?
@theone_031
@theone_031 4 жыл бұрын
great explanation!! Thanks a lot.
@fairyroot1653
@fairyroot1653 4 жыл бұрын
I love your T-shirt
@-q-b0_1
@-q-b0_1 4 жыл бұрын
Great explanation
@egelev
@egelev 3 жыл бұрын
I admire your work. Explaining all these concepts in just 25 minutes is remarkable. Thank you. I still have a question. How does PKCE solve the problem of impersonating a client? There is no secret but the client_id is still public. What stops me from stealing the client_id, generating my own secret, hashing it, and building an URL that I can send to the user presenting myself as the client whose client_id I just stole? How does the OAuth server know that the randomly generated hash secret that comes in pair with a particular client_id is actually coming from the client who owns this client_id?
@aaronpk
@aaronpk 3 жыл бұрын
Thanks! PKCE doesn't claim to solve that problem, client impersonation is a different problem. What PKCE does is ensures that the particular client that makes the request to the token endpoint is the same one that made the first request to the authorization endpoint. Client impersonation is a difficult problem to solve, and right now most things in the wild rely on the fact that it's relatively hard to take over a redirect URL on someone's phone and also get them to start a flow in the attacker's app.
@egelev
@egelev 3 жыл бұрын
@@aaronpk Thank you. I appreciate the fast response :).
@Tomsta17
@Tomsta17 2 жыл бұрын
@@aaronpk Thanks for clarifying the answer to that question. This is something I have been trying to get a solid answer on for some time now and I did not see how PKCE could help this case. I think I may have been previously misinterpreting claims on the purpose of PKCE. It's confusing to me because in your video at 9:20, you explain that the result of the Twitter hack was that anybody could impersonate the Twitter app, and how this hack was a major problem with OAuth 1 and a huge motivator to develop OAuth2. Yet it seems that OAuth2 (or PKCE) does not claim to mitigate this problem? I am still confused :)
@aaronpk
@aaronpk 2 жыл бұрын
@@Tomsta17 It's confusing! So the core problem with OAuth 1 was that everything about it relied on the assumption that the application would be deployed with its own secret. As soon as you try to do that with native apps, the secret isn't secret anymore, so it just breaks down completely. What OAuth 2 did was recognize that some apps don't have the ability to keep a secret, and stops pretending like they can. So while OAuth 2 doesn't solve the app impersonation problem completely, it makes it so that you're aware of the problem and provides guidance on other ways to avoid the issue, primarily using app-claimed HTTPS URLs. But indeed, PKCE has nothing to do with app impersonation, instead it solves other problems even if the app does have its own secret.
@Tomsta17
@Tomsta17 2 жыл бұрын
@@aaronpk Now THAT makes sense :) I was still under the impression that PKCE was somehow trying to "Fix problem A", but instead, all we are now doing is saying: "Problem A is still a problem and will always be a problem (Until we have magic secure client secret storage). But you should know about Problem A, and stop relying on it. Find another way". Kinda? That really changes my outlook, so thanks. And thanks for the speedy response!
@pleasethink4789
@pleasethink4789 2 жыл бұрын
Great content AND def not for the uninitiated (at least not in a 25 minute video).
@monzermasri4490
@monzermasri4490 3 жыл бұрын
amazing content
@karthibalaji3817
@karthibalaji3817 4 жыл бұрын
Splendid !
@danielidonchangeambecauseo7889
@danielidonchangeambecauseo7889 2 жыл бұрын
please don't read and ignore. I didn't even understand anything ... But I'm familiar with the terms . Who is going to train me on this field. I'm willing to put in the time ...
@davida.7586
@davida.7586 3 жыл бұрын
Super!!!
@scottbiggs9846
@scottbiggs9846 4 жыл бұрын
Not happy with your analogy. I get that the front desk is the Authorization Server, but who's the Resource Owner? Is it "me"? It seems like "me" is the client, not the RO. Where does the RO get to express their consent to the transaction? No, definitely not happy with this analogy--just seems to muddy the waters even more. It's been two weeks, and I'm still confused. Like the rest of the vid though. Thanks
@aaronpk
@aaronpk 4 жыл бұрын
You're right that this analogy doesn't have a good way to distinguish between the resource owner and the client, but "you" as the hotel guest are playing both roles. Consent is only one aspect of the OAuth flow and also isn't really represented here. The main thing this analogy shows is how access tokens are like a hotel key, issued by the front desk (authorization server) and read/consumed by the doors (resources), and that only the front desk and the door need to know how they work.
@maxx.mazzeo
@maxx.mazzeo 2 жыл бұрын
I just realize that thanks to hackers we might get improvements in any computer related applications, and this happens all the time.
@paulclay6055
@paulclay6055 2 жыл бұрын
Great video, I would like it but I like the number its at (666)
@toolshack21
@toolshack21 4 жыл бұрын
awesome
@karoladamkiewicz5355
@karoladamkiewicz5355 2 жыл бұрын
glich me do sea huge festive cat litle to my best pet
Everything You Ever Wanted to Know About OAuth and OIDC
33:21
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
Don't underestimate anyone
00:47
奇軒Tricking
Рет қаралды 18 МЛН
Why no RONALDO?! 🤔⚽️
00:28
Celine Dept
Рет қаралды 74 МЛН
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 94 МЛН
Protecting Your APIs with OAuth
59:25
OktaDev
Рет қаралды 13 М.
Securing Your APIs with OAuth 2.0 - API Days
31:36
OktaDev
Рет қаралды 71 М.
An Illustrated Guide to OAuth and OpenID Connect
16:36
OktaDev
Рет қаралды 614 М.
Hacking Oauth Applications - Pt. 1
16:45
Hacking Simplified
Рет қаралды 5 М.
How Hackers Hack JSON Web Tokens
13:15
Loi Liang Yang
Рет қаралды 91 М.
[Webinar] OAuth and OpenID Connect in Plain English
1:01:55
OktaDev
Рет қаралды 21 М.
What's going on with the OAuth 2.0 Implicit flow?
17:18
OktaDev
Рет қаралды 85 М.
HACKING OAuth 2.0 FOR BEGINNERS!
10:26
Farah Hawa
Рет қаралды 44 М.
What is OAuth with PKCE and How Does it Work? | Way of the Future
15:52
Что происходит внутри клавиатуры😮
0:26
Самые УЖАСНЫЕ Dyson наушники! Dyson  #интересное
1:01
ТЕХНОБЛОГ АЛИША
Рет қаралды 113 М.
Durability test of Galaxy Note 8 vs S24 Ultra 😁 #galaxynote8 #s24ultra #iphonexr
0:28
Samsung® telefonlara dair herşey
Рет қаралды 28 МЛН
Better than Nokia ?..
0:14
NEXIDO EDITS
Рет қаралды 11 МЛН