HACKING OAuth 2.0 FOR BEGINNERS!

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 143

  • @rayancrasta7460
    @rayancrasta7460 4 роки тому +14

    Shez doing a great job on youtube cuz to get sponsors within just

  • @Vinayak123-q8p
    @Vinayak123-q8p 2 роки тому +1

    amazing, this could be probably one of the biggest information that i have ever been given..the way how you explain is an amazing..we need such playlist more and more in upcoming days

  • @the_linux_guy1515
    @the_linux_guy1515 4 роки тому +11

    People were getting jealous of Bugcrowd sponsoring ...now Intigriti has sponsored ...and soon Hackerone will ...to hell with them 😂😂...keep up the good work 👍🔥

  • @muizzraheem5937
    @muizzraheem5937 3 роки тому

    Have been having issues comprehending Oauth, this video is a problem solver thanks farah ❤️

    • @FarahHawa
      @FarahHawa  3 роки тому +1

      You’re welcome 😊

  • @soufianeamed217
    @soufianeamed217 4 роки тому +4

    Yaw Farah This Is Just Awesome, Brief And Useful That's Why I Love What You Are Doing, Keep It Up And Stay Safe .

  • @yosoffmalik9135
    @yosoffmalik9135 4 роки тому

    You are good with knowledge and theoretical stuff, your videos gets me into reals basics of topics

  • @devvishack641
    @devvishack641 4 роки тому

    Aweeome . Just awesome . For noobs like me who are just starting in bug bounty . This is the place where we can learn basics in depth. Thanks .
    Please keep posting more such practical videos .

  • @albertobarbieri8280
    @albertobarbieri8280 3 роки тому +1

    Your videos are amazing. Simply to understand and very explicative.

  • @shubhamghosh2228
    @shubhamghosh2228 4 роки тому

    Farah you are doing great! Very informative video. You taught so many things in just 10minutes.

  • @swapnilpotbhare888
    @swapnilpotbhare888 4 роки тому +6

    Excellent, and very good command over Knowledge

  • @NinjaTech1337
    @NinjaTech1337 4 роки тому +3

    Great Teaching Style. Loved Your Contents.🤗

  • @adminhackstar3333
    @adminhackstar3333 4 роки тому +1

    Make an video on best course for beginners in ethical hacking

  • @sohamprince1
    @sohamprince1 4 роки тому +3

    Awesome.. loved the way you teach the concepts and the labs!! Keep it up!

  • @m.waheedanwar7105
    @m.waheedanwar7105 4 роки тому

    Beautifully explained hope to get more knowledge from you girl.More power to you

  • @jayeshprajapati1396
    @jayeshprajapati1396 4 роки тому +1

    Can you make a video on your cyber security journey ??
    ...............................................................
    Video is good👍👍

  • @sudiptapandit4880
    @sudiptapandit4880 4 роки тому +2

    Isn't OAuth is for authorization part only? the 'Sign in with' buttons use OpenID Connect protocol not OAuth. Although nowadays people use these terms interchangeably .

    • @FarahHawa
      @FarahHawa  4 роки тому

      OpenID Connect is a layer that's built on top of OAuth... you can check this here developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc

    • @sudiptapandit4880
      @sudiptapandit4880 4 роки тому

      @@FarahHawa Thanks for clarifying

  • @raselmir1285
    @raselmir1285 3 роки тому

    Great job. Thanks man. Now I am clear.

  • @vaibhav114
    @vaibhav114 3 роки тому

    How old are you? Don't think you are out of school yet. But, amazing grasp of the subject. Kudos!!

  • @chinmay128
    @chinmay128 4 роки тому

    can you make a video on your journey of how you became a hacker
    i want to learn to do all of this stuff but really don't know where to start with .please make a video on it.
    and if you can refer to any video on youtube .i mean for learning.

  • @gyansoni2667
    @gyansoni2667 4 роки тому +2

    Such a nice explanation 👍

  • @cheffysunnythakkkar7614
    @cheffysunnythakkkar7614 4 роки тому

    thank you so much dear for such a wonderful explanation

  • @medioclick
    @medioclick 4 роки тому

    once again simple and good explanation.

  • @balapraneeth9708
    @balapraneeth9708 4 роки тому +1

    Spot on!!. Simply amazing. Thanks for sharing :)

  • @killcode6717
    @killcode6717 3 роки тому

    Thanks for the tutorials

  • @solodancer617
    @solodancer617 4 роки тому

    Very good video, presentation is understanding quiet easily.

  • @mylyf6684
    @mylyf6684 4 роки тому

    I learned something today.💯
    Thanks.

  • @susovangarai6731
    @susovangarai6731 4 роки тому

    Good for beginner like me 👍 .... Please make an advanced level video also

  • @mukoshmanob9240
    @mukoshmanob9240 4 роки тому

    Plzz make a videp about recon

  • @sn0xsecurity696
    @sn0xsecurity696 4 роки тому +1

    are GAJAB lots of love dear stay safe but kabhi video thoda hindi meh bhi bana dena toh aapke susbcribers bhi jada jldi grow karenge hope u got it my point and thanks for this video.
    by
    @MR CYBERTRON YT

  • @vasuyadav9171
    @vasuyadav9171 4 роки тому +1

    Hi Farah can you please tell the impact of the csrf one and reuse of token and also there severity category?
    Btw nice video

  • @ravichhetri8918
    @ravichhetri8918 3 роки тому

    Hi Farah, Do you take session on the bypass techniques for Saml, Oauth ,oidc..I am very much interested.

  • @Jaatranger-f1e
    @Jaatranger-f1e 3 роки тому

    Please make hindi vedio

  • @RakeshWaghela
    @RakeshWaghela 3 роки тому

    awesome video, keep it up. you earned a sub !

  • @abhinavkishoregv273
    @abhinavkishoregv273 4 роки тому

    nice explanation. Thank you

  • @ishikasharma1103
    @ishikasharma1103 4 роки тому

    Really a good video!

  • @aadarshverma6913
    @aadarshverma6913 4 роки тому

    Make more videos please I love them and I want to be just like you

  • @boneytech3965
    @boneytech3965 4 роки тому

    Can you Please upload more about oAuth Vulnerability
    In websites with more detail.

  • @ahjee718
    @ahjee718 3 роки тому

    Thank you for this video! Is it possible for you to do a tutorial on how to create a live web server similar to the one you showed in this video that captures vulnerabilities like the OAuth access token?

  • @wiz2398
    @wiz2398 3 роки тому

    Bhai yeh kittiiiee Awesome hai.. 😍😘

  • @fypage.
    @fypage. 4 роки тому

    Wow 10k congrats your channel has grown so fast earlier this year I had like 1 or 2k subs

  • @SageTheProfessor
    @SageTheProfessor 4 роки тому

    Thank you Farah. Very useful explanation and amazing demos. Keep up the great work.

  • @RelaxMusic2zero23
    @RelaxMusic2zero23 4 роки тому +1

    the best source(it may piad too) learn hacking and related, and where you learn all these things

  • @himanshushekharpandey1519
    @himanshushekharpandey1519 4 роки тому +1

    awesome explanation as always :)

  • @balveersinghbhatia
    @balveersinghbhatia 4 роки тому

    Nice work thanks for this video

  • @kalyanidudhekar3655
    @kalyanidudhekar3655 4 роки тому

    Farah this helps me a lot but can u plzz make a vedio on subdomain takeover

    • @cimihan4816
      @cimihan4816 4 роки тому

      ua-cam.com/video/67chVkq3g0M/v-deo.html

  • @amarshaikh2147
    @amarshaikh2147 4 роки тому +2

    Thanks it's good info for developers as well to improve there application security 🔒🔒🔒 thanks ❤❤❤❤ again.

  • @MohitSharma-xf9wp
    @MohitSharma-xf9wp 3 роки тому

    Very much appreciated

  • @phitran5164
    @phitran5164 4 роки тому

    Nice video, thanks you so much

  • @SumitSingh-xu4qs
    @SumitSingh-xu4qs 3 роки тому

    great explain sister

  • @joharraza5231
    @joharraza5231 4 роки тому

    Excellent work. Very informative. But please don't use music. 👍

  • @pussycat0x676
    @pussycat0x676 4 роки тому

    Awesome work :D

  • @vishalkothari8065
    @vishalkothari8065 4 роки тому

    So if i want to get details of a user on client side of the application using an ajax call and display those same details to the user then it is an authorisation code grant example right?

  • @Clo326
    @Clo326 2 роки тому

    Sooper videos

  • @Sniperrkr
    @Sniperrkr 4 роки тому

    Thank you!

  • @nobody-ho4rh
    @nobody-ho4rh 4 роки тому

    I am getting warning as: Warning: missing space before text for line 14 of jade file "/usr/src/app/views/login.jade"
    And not able to authorize the request.
    can someone help me with it please :) ?

  • @Bosssssss77777
    @Bosssssss77777 2 роки тому

    Please Make Playlist On Bwapp,Dvwa

  • @pakflutterdeveloper
    @pakflutterdeveloper 4 роки тому

    Excellent work :)

  • @hannanjamil1060
    @hannanjamil1060 4 роки тому +1

    Great work Farah!

  • @graycybermonk3068
    @graycybermonk3068 4 роки тому

    Hi, I am your big follower. I have started new in this bounty. Can you tell what about Automated Scans? Every where I got out of scope this Automated Scans. Please I need some help.

    • @FarahHawa
      @FarahHawa  4 роки тому +2

      Basically, programs mark automated scans as out-of-scope findings because they create too much noise on the server and result in the discovery of bugs that are known or false positives. It's best to not rely on automated scans for bug bounties.

    • @graycybermonk3068
      @graycybermonk3068 4 роки тому

      @@FarahHawa thank for very good reply. Takr my respect. You are like my sister. Really I am appreciate to you and your channel. I started bug bounty. But I am not getting any path how to start. What kind of toolsa I will use? Can you help me little bit. Really I am stuck. Thanks for your reply and respect.

  • @adityasadhukhan8438
    @adityasadhukhan8438 4 роки тому

    Can you help me with resources to study about advanced SQL

  • @vikasmeshram2515
    @vikasmeshram2515 4 роки тому

    I also want to study but didn't found something better.

  • @omerfarooqdemir9907
    @omerfarooqdemir9907 4 роки тому

    which ubuntu distribution are you using

  • @InfraHero
    @InfraHero 4 роки тому

    Awesome ...!!

  • @gulhameed1270
    @gulhameed1270 4 роки тому

    what if we replace the state parameter value with other account state value,and the account logged in ?. is it still consider as OAuth missconfiguration?

  • @cyberUF
    @cyberUF 4 роки тому +1

    Hey I learn lot from You !
    Can you create how we exploit dom based xss or any dom based issue

  • @winklerrr
    @winklerrr Рік тому

    Where did you find your information? :)

  • @cyber__hawk5555
    @cyber__hawk5555 3 роки тому

    Which lab are you using ?

  • @vijaykannanhere
    @vijaykannanhere 4 роки тому

    Much Appreicated . :)

  • @abhisheksanmare6835
    @abhisheksanmare6835 3 роки тому

    hello mam. I have encountered that while signing again, the website is sending an OTP to my previous device, not on my number in the new device. I once had an account on that website that was deleted due to inactivity. is it a flaw to be explored?

  • @prasantabanerjee1184
    @prasantabanerjee1184 3 роки тому

    excellent 🤗

  • @dsdgaming2242
    @dsdgaming2242 4 роки тому

    Wow. Such a beauty and skills is just

  • @nayeem9358
    @nayeem9358 4 роки тому

    Awesome

  • @jakianam9554
    @jakianam9554 4 роки тому

    You should add subtitles

  • @prashantkumar2963
    @prashantkumar2963 4 роки тому

    what is your ug course?

  • @cyber_tech_404
    @cyber_tech_404 4 роки тому

    Love u bro

  • @hassan12141
    @hassan12141 4 роки тому

    Great job+great content
    I really appreciate her work❤

  • @whyrohit4197
    @whyrohit4197 4 роки тому +1

    Just wanted to know the specs of your laptop..?? And if you're comfortable,i want to know that..... How you make thumbnails😰😰😰😰😰its looks damn! Cool! :'??

    • @FarahHawa
      @FarahHawa  4 роки тому +2

      8gb ram, i5 processor. I do have another laptop with better specs but this one does it for me on most days. Thanks, I use Canva to make thumbnails :)

  • @rutwikhiwalkar9583
    @rutwikhiwalkar9583 4 роки тому +3

    Not a fan of the background music Farah. Great video tbh!

  • @playforpassion7111
    @playforpassion7111 4 роки тому +1

    Can someone explain the impact of reusing access tokens?

  • @faique2995
    @faique2995 4 роки тому

    awesome

  • @vikasmeshram2515
    @vikasmeshram2515 4 роки тому

    Apne hacking kaha se sikha ??

  • @bharathpatel1757
    @bharathpatel1757 4 роки тому

    Hi dhidhi . I'm completely a zero level beginner intrested in learning about ethical hacking and I was on search of finding people who could suggest me possible ways of learning things from beginning and I found your profile in linkedin . Please could you suggest me some youtube tutorial for learning hacking from very basic level .

    • @FarahHawa
      @FarahHawa  4 роки тому +1

      ua-cam.com/channels/PiN9NPjIer8Do9gUFxKv7A.html , ua-cam.com/channels/QN2DsjnYH60SFBIA6IkNwg.html and ua-cam.com/channels/CZDt7MuC3Hzs6IH4xODLBw.html are all great

    • @bharathpatel1757
      @bharathpatel1757 4 роки тому

      @@FarahHawa thank you ! So much

  • @pankajholariya8331
    @pankajholariya8331 3 роки тому

    thx

  • @mr.heretic8192
    @mr.heretic8192 4 роки тому +1

    Hey appreciate your skill & teaching skills.....
    I've cleared my 12th, please advise me what should i do to get cyper security

  • @merchant1998
    @merchant1998 3 роки тому

    Hello, I need your help please

  • @gowthamvyasmalkari4511
    @gowthamvyasmalkari4511 4 роки тому

    Awesome 😊😊.Nice video.
    I too wanna to become bug bounty hunter.
    Which topics should I start to read in web application hackers handbook? and which topics just to leave?
    Please answer.

    • @gowthamvyasmalkari4511
      @gowthamvyasmalkari4511 4 роки тому

      Please make a videos on this.Thank u

    • @FarahHawa
      @FarahHawa  4 роки тому +1

      Everything up till chapter 13 is mostly relevant

    • @gowthamvyasmalkari4511
      @gowthamvyasmalkari4511 4 роки тому

      @@FarahHawa how much time do u think for a beginner to a bug hunter by the resources u mentioned in the first videos.
      How many years took it for u ?

    • @FarahHawa
      @FarahHawa  4 роки тому +2

      @@gowthamvyasmalkari4511 you can do it in a few months tbh. I was doing a little bit of coding, reading handbook, labs and blogs everyday. Give 1-2 hours to each resource and you can be done in 2-3 months if you're a fast learner.

    • @AkashHamal0x01
      @AkashHamal0x01 4 роки тому

      @@FarahHawa hi farah u havent hunted a single bug .U will face massive trolling

  • @anabakhtar3774
    @anabakhtar3774 4 роки тому

    Really informativel video Farah 💯

  • @sachinmaurya3259
    @sachinmaurya3259 4 роки тому

    Love to watch your videos and also learn a lot from your video:)

    • @FarahHawa
      @FarahHawa  4 роки тому

      That's great! Thank you for watching!

  • @ganeshnishitha4425
    @ganeshnishitha4425 3 роки тому

    nice sister

  • @rishad6324
    @rishad6324 4 роки тому

    wow. you are just amazing.

  • @itszabbs1740
    @itszabbs1740 4 роки тому

    Nice video . You have helped me a lot .

  • @shubhamsoni8093
    @shubhamsoni8093 4 роки тому

    Great work Farah! So you're from Commerce background how did you come to hacking?

  • @cjhackerz
    @cjhackerz 4 роки тому +1

    She attacks, she protects (with help of bug bounties) and most importantly she hacks ;D great job again well explained video.

  • @l1f07bscs0035
    @l1f07bscs0035 4 роки тому

    an awesome detailed written guide here decatechlabs.com/oauth2-explained-and-how-oauth2-works-oauth-in-action

  •  4 роки тому +1

    god level knowledge

  • @JasonGomes140294
    @JasonGomes140294 4 роки тому

    Well Explained!!! Why do you use ubuntu instead of kali linux??

    • @FarahHawa
      @FarahHawa  4 роки тому +1

      thank you! I use both, but the lab required Docker and that's set up on my Ubuntu box.

    • @JasonGomes140294
      @JasonGomes140294 4 роки тому

      @@FarahHawa ohk nice. Waiting for the next series of vdos. keep 'em coming

  • @amolgangurde5714
    @amolgangurde5714 4 роки тому

    Nice explanation, keep sharing 👌

  • @Sham-xg9kd
    @Sham-xg9kd 4 роки тому +1

    Your great in teaching ... Cyber security researcher

  • @harjotsaini1038
    @harjotsaini1038 4 роки тому +1

    Beauty with Brain ⚡

  • @hikefka8001
    @hikefka8001 2 роки тому

    👏👏👩‍💻🧙‍♀