Home
Explore
Submit Search
Upload
Login
Signup
Yevhen Teleshyk - OAuth Phishing
Report
OWASP Kyiv
Follow
OWASP Kyiv
Mar. 4, 2018
•
0 likes
•
362 views
1
of
12
Yevhen Teleshyk - OAuth Phishing
Mar. 4, 2018
•
0 likes
•
362 views
Download Now
Download to read offline
Report
Technology
Phishing Threats to Cloud Users
OWASP Kyiv
Follow
OWASP Kyiv
Recommended
Preventing XSRF in ASP.NET CORE apps
Fiyaz Hasan
267 views
•
13 slides
Pentest Expectations
Ihor Uzhvenko
173 views
•
30 slides
Introduction to OAuth
Paul Osman
3.3K views
•
49 slides
IdM and AC
Fernando Lopez Aguilar
2.5K views
•
43 slides
OAuth1.0
G Jayendra Kartheek
2.2K views
•
16 slides
Token Based Authentication Systems with AngularJS & NodeJS
Hüseyin BABAL
6.2K views
•
15 slides
More Related Content
Slideshows for you
REST Service Authetication with TLS & JWTs
Jon Todd
8K views
•
60 slides
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
49.2K views
•
40 slides
OpenId and OAuth2: Rear, Medium, Well Done - UA Mobile 2019
UA Mobile
124 views
•
19 slides
Adding Identity Management and Access Control to your Application
Fernando Lopez Aguilar
3.1K views
•
19 slides
OAuth 2.0
Uwe Friedrichsen
4.6K views
•
44 slides
iMasters Intercon 2016 - Identity within Microservices
Erick Belluci Tedeschi
548 views
•
34 slides
Slideshows for you
(19)
REST Service Authetication with TLS & JWTs
Jon Todd
•
8K views
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
•
49.2K views
OpenId and OAuth2: Rear, Medium, Well Done - UA Mobile 2019
UA Mobile
•
124 views
Adding Identity Management and Access Control to your Application
Fernando Lopez Aguilar
•
3.1K views
OAuth 2.0
Uwe Friedrichsen
•
4.6K views
iMasters Intercon 2016 - Identity within Microservices
Erick Belluci Tedeschi
•
548 views
Design and Analyze Secure Networked Systems - 3
Don Kim
•
35 views
How to get rid of terraform plan diffs
Yukiya Hayashi
•
679 views
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
•
2.9K views
2016 pycontw web api authentication
Micron Technology
•
2K views
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Alexandre Morgaut
•
5.2K views
Ignite Talk: I AM a robot, how do I log in?
VMware Tanzu
•
269 views
D@W REST security
Gaurav Sharma
•
475 views
An introduction to OAuth 2
Sanjoy Kumar Roy
•
710 views
Securing RESTful Payment APIs Using OAuth 2
Jonathan LeBlanc
•
6K views
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Stormpath
•
12K views
What the Heck is OAuth and Open ID Connect? - UberConf 2017
Matt Raible
•
877 views
Esquema de pasos de ejecución IdM
Fernando Lopez Aguilar
•
697 views
JSON Web Token
Deddy Setyadi
•
1.5K views
Similar to Yevhen Teleshyk - OAuth Phishing
A simple PHP LinkedIn OAuth 2.0 example
Mattia Reggiani
4.6K views
•
16 slides
OAuth in the Wild
Victor Rentea
170 views
•
31 slides
アプリ開発で知っておきたい認証技術 - OAuth 1.0 + OAuth 2.0 + OpenID Connect -
Naoki Nagazumi
22.6K views
•
131 slides
What the Heck is OAuth and OIDC - Denver Developer Identity Workshop 2020
Matt Raible
175 views
•
80 slides
What the Heck is OAuth and OIDC - UberConf 2018
Matt Raible
606 views
•
89 slides
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
Andreas Falk
338 views
•
35 slides
Similar to Yevhen Teleshyk - OAuth Phishing
(20)
A simple PHP LinkedIn OAuth 2.0 example
Mattia Reggiani
•
4.6K views
OAuth in the Wild
Victor Rentea
•
170 views
アプリ開発で知っておきたい認証技術 - OAuth 1.0 + OAuth 2.0 + OpenID Connect -
Naoki Nagazumi
•
22.6K views
What the Heck is OAuth and OIDC - Denver Developer Identity Workshop 2020
Matt Raible
•
175 views
What the Heck is OAuth and OIDC - UberConf 2018
Matt Raible
•
606 views
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
Andreas Falk
•
338 views
OAuth 2.0 – A standard is coming of age by Uwe Friedrichsen
Codemotion
•
1.2K views
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
iMasters
•
1.2K views
OAuth 2.0 and Library
Kenji Otsuka
•
176 views
O auth2.0 guide
Dilip Mohapatra
•
1.9K views
Integrating services with OAuth
Luca Mearelli
•
8.1K views
Adding Identity Management and Access Control to your Application, Authorization
Fernando Lopez Aguilar
•
1.9K views
What the Heck is OAuth and OpenID Connect - RWX 2017
Matt Raible
•
708 views
MQTT security
Anthony Chow
•
1.5K views
[LDAPCon 2015] The OpenID Connect Protocol
Clément OUDOT
•
1.6K views
Api security with OAuth
thariyarox
•
119 views
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
CA API Management
•
996 views
OAuth and why you should use it
Sergey Podgornyy
•
204 views
What the Heck is OAuth and OpenID Connect - DOSUG 2018
Matt Raible
•
1.5K views
#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2
Profesia Srl a socio unico
•
35 views
More from OWASP Kyiv
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
OWASP Kyiv
246 views
•
34 slides
Software Supply Chain Security та компоненти з відомими вразливостями
OWASP Kyiv
197 views
•
21 slides
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
153 views
•
31 slides
Threat Modeling with OWASP Threat Dragon
OWASP Kyiv
600 views
•
12 slides
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
OWASP Kyiv
693 views
•
79 slides
Vlad Styran - Cyber Security Economics 101
OWASP Kyiv
466 views
•
17 slides
More from OWASP Kyiv
(20)
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
OWASP Kyiv
•
246 views
Software Supply Chain Security та компоненти з відомими вразливостями
OWASP Kyiv
•
197 views
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
•
153 views
Threat Modeling with OWASP Threat Dragon
OWASP Kyiv
•
600 views
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
OWASP Kyiv
•
693 views
Vlad Styran - Cyber Security Economics 101
OWASP Kyiv
•
466 views
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
OWASP Kyiv
•
2.4K views
Ivan Vyshnevskyi - Not So Quiet Git Push
OWASP Kyiv
•
432 views
Dima Kovalenko - Modern SSL Pinning
OWASP Kyiv
•
525 views
Vlada Kulish - Why So Serial?
OWASP Kyiv
•
590 views
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
OWASP Kyiv
•
344 views
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
OWASP Kyiv
•
815 views
Ihor Bliumental - WebSockets
OWASP Kyiv
•
343 views
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
OWASP Kyiv
•
1.1K views
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
OWASP Kyiv
•
647 views
Andriy Shalaenko - GO security tips
OWASP Kyiv
•
1.5K views
Vlad Styran - "Hidden" Features of the Tools We All Love
OWASP Kyiv
•
636 views
Volodymyr Ilibman - Close Look at Nyetya Investigation
OWASP Kyiv
•
412 views
Ihor Bliumental - Collision CORS
OWASP Kyiv
•
370 views
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
OWASP Kyiv
•
548 views
Recently uploaded
What’s new in Kotlin 12-08-2023 Google IO Cairo 23
Ahmed Nabil
66 views
•
27 slides
Workshop on IoT and Basic Home Automation_BAIUST.pptx
Redwan Ferdous
27 views
•
126 slides
Deploying CloudStack with Ceph
ShapeBlue
108 views
•
8 slides
Future of Virtual reality
mdpavel4
13 views
•
1 slide
Welcome and State of Apache CloudStack Community
ShapeBlue
149 views
•
12 slides
INASLA_AI and Landscape Architecture.pptx
Jonathon Geels
66 views
•
26 slides
Recently uploaded
(20)
What’s new in Kotlin 12-08-2023 Google IO Cairo 23
Ahmed Nabil
•
66 views
Workshop on IoT and Basic Home Automation_BAIUST.pptx
Redwan Ferdous
•
27 views
Deploying CloudStack with Ceph
ShapeBlue
•
108 views
Future of Virtual reality
mdpavel4
•
13 views
Welcome and State of Apache CloudStack Community
ShapeBlue
•
149 views
INASLA_AI and Landscape Architecture.pptx
Jonathon Geels
•
66 views
GDSC_Info_Session_KITTiptur.pptx
RadhikaNA
•
38 views
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...
DianaGray10
•
48 views
Daily Scrum, Sprint Review & Retrospective.pptx
Md. Rakib Trofder
•
90 views
Carrom Pool Mod APK.docx
RayJ12
•
15 views
[KCD GT 2023] Demystifying etcd failure scenarios for Kubernetes.pdf
William Caban
•
45 views
GDSC INFO.pptx
AshishChanchal1
•
36 views
Asterisk Update
OpenDireito
•
15 views
NoSQL Database Migration Masterclass - Session 3: Migration Logistics
ScyllaDB
•
27 views
Diogo Monteiro- KAMK Certificate - Demola Global Project 2023.pdf
DiogoMonteiro786960
•
22 views
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
Alex Pruden
•
17 views
Testing and Developing GraphQL APIs
Postman
•
21 views
AI and ML Series - Introduction to Generative AI and LLMs - Session 1
DianaGray10
•
179 views
OpenFOAM benchmark for EPYC server -Influence of coarsestLevelCorr in GAMG so...
takuyayamamoto1800
•
14 views
Sell&Buy.pdf
Danielle95109
•
55 views
Yevhen Teleshyk - OAuth Phishing
Yevhen Teleshyk Phishing Threats
to Cloud Users
Phishing - spear phishing -
clone phishing - whaling
OAuth2 Application Authorization server Resource Server Resource owner Authorization request Authorization grant Authorization
grant Access Token Protected Resource Access Token
Registration
Authorizations request Application Resource owner Authorization request https://login.microsoftonline.com/common/oauth2/v2.0/authorize?response_ type=code&client_id={}&redirect_uri={}&scope={}
Scopes
Authorization grant
OAuth2 Application Authorization server Access Token
JWT JWT= eyJ0eXAiOiJKV1QiLCJhbGciOiJub25lIn0.eyJhdWQiOiIyZDRkMTFhMi1mODE0LTQ2Y TctODkwYS0yNzRhNzJhNzMwOWUiLCJpc3MiOiJodHRwczovL3N0cy53aW5kb3dzLm 5ldC83ZmU4MTQ0Ny1kYTU3LTQzODUtYmVjYi02ZGU1N2YyMTQ3N2UvIiwiaWF0Ijo xMzg4NDQwODYzLCJuYmYiOjEzODg0NDA4NjMsImV4cCI6MTM4ODQ0NDc2Mywid mVyIjoiMS4wIiwidGlkIjoiN2ZlODE0NDctZGE1Ny00Mzg1LWJlY2ItNmRlNTdmMjE0Nzd lIiwib2lkIjoiNjgzODlhZTItNjJmYS00YjE4LTkxZmUtNTNkZDEwOWQ3NGY1IiwidXBuIjoi ZnJhbmttQGNvbnRvc28uY29tIiwidW5pcXVlX25hbWUiOiJmcmFua21AY29udG9zby5j b20iLCJzdWIiOiJKV3ZZZENXUGhobHBTMVpzZjd5WVV4U2hVd3RVbTV5elBtd18talg zZkhZIiwiZmFtaWx5X25hbWUiOiJNaWxsZXIiLCJnaXZlbl9uYW1lIjoiRnJhbmsifQ.iwid W5pcXVlX25hbWUiOiJmcmFua21 JWT = base64(header.payload.signature) Header
= {"typ","nonce","alg","x5t","kid"} Payload = {"aud":"https://graph.microsoft.com","iss","iat","nbf", "exp","acr","aio","amr","app_displayname","appid","appidacr", "family_name","given_name","ipaddr","name","oid","onprem_sid", "platf","puid","scp","sub","tid","unique_name","upn","uti","ver"}
Revoking
Questions?
References: • https://tools.ietf.org/html/rfc6749 • https://msdn.microsoft.com/en-us/office/office365/api/mail-rest-operations •
https://docs.microsoft.com/en-us/outlook/rest/node-tutorial#using-the-mail-api • https://www.elevenpaths.com/new-ransomcloud-o365-report/index.html