Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
REST Service Authetication with TLS & JWTs
Jon Todd
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
OpenId and OAuth2: Rear, Medium, Well Done - UA Mobile 2019
UA Mobile
Adding Identity Management and Access Control to your Application
Fernando Lopez Aguilar
OAuth 2.0
Uwe Friedrichsen
iMasters Intercon 2016 - Identity within Microservices
Erick Belluci Tedeschi
Design and Analyze Secure Networked Systems - 3
Don Kim
How to get rid of terraform plan diffs
Yukiya Hayashi
1
of
12
Top clipped slide
Yevhen Teleshyk - OAuth Phishing
Mar. 4, 2018
•
0 likes
0 likes
×
Be the first to like this
Show More
•
362 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Technology
Phishing Threats to Cloud Users
OWASP Kyiv
Follow
OWASP Kyiv
Advertisement
Advertisement
Advertisement
Recommended
Preventing XSRF in ASP.NET CORE apps
Fiyaz Hasan
267 views
•
13 slides
Pentest Expectations
Ihor Uzhvenko
173 views
•
30 slides
Introduction to OAuth
Paul Osman
3.3K views
•
49 slides
IdM and AC
Fernando Lopez Aguilar
2.5K views
•
43 slides
OAuth1.0
G Jayendra Kartheek
2.2K views
•
16 slides
Token Based Authentication Systems with AngularJS & NodeJS
Hüseyin BABAL
6.2K views
•
15 slides
More Related Content
Slideshows for you
(19)
REST Service Authetication with TLS & JWTs
Jon Todd
•
8K views
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
•
49.2K views
OpenId and OAuth2: Rear, Medium, Well Done - UA Mobile 2019
UA Mobile
•
122 views
Adding Identity Management and Access Control to your Application
Fernando Lopez Aguilar
•
3.1K views
OAuth 2.0
Uwe Friedrichsen
•
4.5K views
iMasters Intercon 2016 - Identity within Microservices
Erick Belluci Tedeschi
•
548 views
Design and Analyze Secure Networked Systems - 3
Don Kim
•
35 views
How to get rid of terraform plan diffs
Yukiya Hayashi
•
679 views
Securing RESTful APIs using OAuth 2 and OpenID Connect
Jonathan LeBlanc
•
2.9K views
2016 pycontw web api authentication
Micron Technology
•
2K views
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Alexandre Morgaut
•
5.2K views
Ignite Talk: I AM a robot, how do I log in?
VMware Tanzu
•
269 views
D@W REST security
Gaurav Sharma
•
474 views
An introduction to OAuth 2
Sanjoy Kumar Roy
•
685 views
Securing RESTful Payment APIs Using OAuth 2
Jonathan LeBlanc
•
6K views
Building Secure User Interfaces With JWTs (JSON Web Tokens)
Stormpath
•
12K views
What the Heck is OAuth and Open ID Connect? - UberConf 2017
Matt Raible
•
876 views
Esquema de pasos de ejecución IdM
Fernando Lopez Aguilar
•
696 views
JSON Web Token
Deddy Setyadi
•
1.5K views
Similar to Yevhen Teleshyk - OAuth Phishing
(20)
A simple PHP LinkedIn OAuth 2.0 example
Mattia Reggiani
•
4.6K views
OAuth in the Wild
Victor Rentea
•
165 views
アプリ開発で知っておきたい認証技術 - OAuth 1.0 + OAuth 2.0 + OpenID Connect -
Naoki Nagazumi
•
22.4K views
What the Heck is OAuth and OIDC - Denver Developer Identity Workshop 2020
Matt Raible
•
168 views
What the Heck is OAuth and OIDC - UberConf 2018
Matt Raible
•
605 views
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
Andreas Falk
•
338 views
OAuth 2.0 – A standard is coming of age by Uwe Friedrichsen
Codemotion
•
1.2K views
InterCon 2016 - Segurança de identidade digital levando em consideração uma a...
iMasters
•
1.2K views
OAuth 2.0 and Library
Kenji Otsuka
•
176 views
O auth2.0 guide
Dilip Mohapatra
•
1.9K views
Integrating services with OAuth
Luca Mearelli
•
8.1K views
Adding Identity Management and Access Control to your Application, Authorization
Fernando Lopez Aguilar
•
1.9K views
What the Heck is OAuth and OpenID Connect - RWX 2017
Matt Raible
•
707 views
MQTT security
Anthony Chow
•
1.5K views
[LDAPCon 2015] The OpenID Connect Protocol
Clément OUDOT
•
1.6K views
Api security with OAuth
thariyarox
•
117 views
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
CA API Management
•
996 views
OAuth and why you should use it
Sergey Podgornyy
•
203 views
What the Heck is OAuth and OpenID Connect - DOSUG 2018
Matt Raible
•
1.5K views
#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2
Profesia Srl a socio unico
•
35 views
Advertisement
More from OWASP Kyiv
(20)
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
OWASP Kyiv
•
245 views
Software Supply Chain Security та компоненти з відомими вразливостями
OWASP Kyiv
•
197 views
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
•
153 views
Threat Modeling with OWASP Threat Dragon
OWASP Kyiv
•
590 views
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
OWASP Kyiv
•
693 views
Vlad Styran - Cyber Security Economics 101
OWASP Kyiv
•
466 views
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
OWASP Kyiv
•
2.4K views
Ivan Vyshnevskyi - Not So Quiet Git Push
OWASP Kyiv
•
432 views
Dima Kovalenko - Modern SSL Pinning
OWASP Kyiv
•
524 views
Vlada Kulish - Why So Serial?
OWASP Kyiv
•
590 views
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
OWASP Kyiv
•
344 views
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
OWASP Kyiv
•
815 views
Ihor Bliumental - WebSockets
OWASP Kyiv
•
343 views
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
OWASP Kyiv
•
1.1K views
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
OWASP Kyiv
•
647 views
Andriy Shalaenko - GO security tips
OWASP Kyiv
•
1.5K views
Vlad Styran - "Hidden" Features of the Tools We All Love
OWASP Kyiv
•
636 views
Volodymyr Ilibman - Close Look at Nyetya Investigation
OWASP Kyiv
•
412 views
Ihor Bliumental - Collision CORS
OWASP Kyiv
•
370 views
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
OWASP Kyiv
•
547 views
Recently uploaded
(20)
independent researcher
amanvijayjindal
•
0 views
Trane THT2212-SPST Therm Cutoff; 265Op 35C-PartsHnC.pdf
PartsHnC Hvac Parts
•
0 views
Vin secure solutions PPT (1).pdf
vin secure solutions
•
0 views
Supply Chain Attacks
Lionel Faleiro
•
0 views
Cloud Forensics Tools
Christopher Doman
•
0 views
Evolución de una arquitectura monolítica hacia decoupled commerce en un retai...
Marcos Pueyrredon
•
0 views
The Benefits of Adopting the Lamp Tech Stack: A Comprehensive Guide:
Brain Inventory
•
0 views
Valere Project Portfolio June 2023
Alexander Turgeon
•
0 views
Temporary Tattoo.pdf
DevDeshpande2
•
3 views
trackingSpoofedIp.pptx
BincySam2
•
0 views
Using Data-Driven Agile Automation to Advance Digital Transformation
Precisely
•
0 views
W-6-7-Ch-5-Tank Suspension system.pptx
vishnoo7
•
0 views
Untitled presentation.pdf
SompriyaNarayanaTiwa
•
0 views
UNCOVERING MYTHS ABOUT CLOUD COMPUTING - IS IT.pptx
OsazeeOboh
•
0 views
Open Data Center Interconnect Products and Solutions Brochure -GL.pdf
Gigalight
•
3 views
Python Sets_Dictionary.pptx
M Vishnuvardhan Reddy
•
0 views
W-2-Ch-2-Intro to Power plants.ppt
vishnoo7
•
0 views
Hologram
Butterfly education
•
0 views
Tips and tricks for data science projects with Python
Jose Manuel Ortega Candel
•
0 views
Wireless Computing in 6 slides.pptx
Mari Xxx
•
0 views
Advertisement
Yevhen Teleshyk - OAuth Phishing
Yevhen Teleshyk Phishing Threats
to Cloud Users
Phishing - spear phishing -
clone phishing - whaling
OAuth2 Application Authorization server Resource Server Resource owner Authorization request Authorization grant Authorization
grant Access Token Protected Resource Access Token
Registration
Authorizations request Application Resource owner Authorization request https://login.microsoftonline.com/common/oauth2/v2.0/authorize?response_ type=code&client_id={}&redirect_uri={}&scope={}
Scopes
Authorization grant
OAuth2 Application Authorization server Access Token
JWT JWT= eyJ0eXAiOiJKV1QiLCJhbGciOiJub25lIn0.eyJhdWQiOiIyZDRkMTFhMi1mODE0LTQ2Y TctODkwYS0yNzRhNzJhNzMwOWUiLCJpc3MiOiJodHRwczovL3N0cy53aW5kb3dzLm 5ldC83ZmU4MTQ0Ny1kYTU3LTQzODUtYmVjYi02ZGU1N2YyMTQ3N2UvIiwiaWF0Ijo xMzg4NDQwODYzLCJuYmYiOjEzODg0NDA4NjMsImV4cCI6MTM4ODQ0NDc2Mywid mVyIjoiMS4wIiwidGlkIjoiN2ZlODE0NDctZGE1Ny00Mzg1LWJlY2ItNmRlNTdmMjE0Nzd lIiwib2lkIjoiNjgzODlhZTItNjJmYS00YjE4LTkxZmUtNTNkZDEwOWQ3NGY1IiwidXBuIjoi ZnJhbmttQGNvbnRvc28uY29tIiwidW5pcXVlX25hbWUiOiJmcmFua21AY29udG9zby5j b20iLCJzdWIiOiJKV3ZZZENXUGhobHBTMVpzZjd5WVV4U2hVd3RVbTV5elBtd18talg zZkhZIiwiZmFtaWx5X25hbWUiOiJNaWxsZXIiLCJnaXZlbl9uYW1lIjoiRnJhbmsifQ.iwid W5pcXVlX25hbWUiOiJmcmFua21 JWT = base64(header.payload.signature) Header
= {"typ","nonce","alg","x5t","kid"} Payload = {"aud":"https://graph.microsoft.com","iss","iat","nbf", "exp","acr","aio","amr","app_displayname","appid","appidacr", "family_name","given_name","ipaddr","name","oid","onprem_sid", "platf","puid","scp","sub","tid","unique_name","upn","uti","ver"}
Revoking
Questions?
References: • https://tools.ietf.org/html/rfc6749 • https://msdn.microsoft.com/en-us/office/office365/api/mail-rest-operations •
https://docs.microsoft.com/en-us/outlook/rest/node-tutorial#using-the-mail-api • https://www.elevenpaths.com/new-ransomcloud-o365-report/index.html
Advertisement