Loading...

Shining a Light on OAuth Abuse with PwnAuth (Article,wiki and Full Sources)

In Summary : Spear phishing attacks are seen as one of the biggest cyber threats to an organization. It only takes one employee to enter t...

In Summary :

Spear phishing attacks are seen as one of the biggest cyber threats to an organization. It only takes one employee to enter their credentials or run some malware for an entire organization to become compromised. As such, companies devote significant resources to preventing credential harvesting and payload-driven social engineering attacks. Less attention, however, has been paid to a non-traditional, but just as dangerous, method of social engineering: OAuth abuse. In an OAuth abuse attack, a victim authorizes a third-party application to access their account. Once authorized, the application can access the user's data without the need for credentials and bypassing any two-factor authentication that may be in place [...]

kindly refer the following link as follow up :
https://ift.tt/2s0bZ4M

Post a Comment

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats