How to Hack OAuth

Поділитися
Вставка
  • Опубліковано 18 жов 2024

КОМЕНТАРІ • 60

  • @CrazyFarseer
    @CrazyFarseer 4 роки тому +11

    Your OAuth analogies in the beginning are really, really helpful!

    • @mccannhealthcompany8625
      @mccannhealthcompany8625 4 роки тому

      All thanks to expeditetools com i received a hacked transfer of $34,000 .They are awesome.

  • @lilyrosestracke4591
    @lilyrosestracke4591 3 роки тому +17

    This is the most informative video on OAuth I've ever seen, from the authoritative source. Well done.

  • @munisharya3797
    @munisharya3797 4 роки тому +5

    i usually don't comment. But this video i can't resist . Amazing explanation. Too good. Thanks for lighting the path...

  • @threemr01
    @threemr01 Рік тому +1

    Fantastic explanations, Aaron!! Thank you very much. They were extremely helpful and I appreciate you took the time to review the jargon and still simplify the language during the explanation.

  • @No1CanGetMe
    @No1CanGetMe Рік тому

    After watching this video, I am not the same person anymore. Thank you.

  • @nathansherrard4111
    @nathansherrard4111 4 роки тому +2

    Awesome presentation - I really understood all those OAuth headlines from 2017 better now!
    However, was there something cut at the @22:25 mark? Seems to jump ahead and missed his intro to the View As feature...

    • @aaronpk
      @aaronpk 4 роки тому

      oh no, you're right! I'm not sure how that got lost! It was supposed to be an explanation of the "View As" feature!

    • @OktaDev
      @OktaDev  4 роки тому +1

      "Facebook had this great feature called 'View As'. You could be on your profile page and click View As and see what your profile looked like to someone else." was the sentence missing from the edit

    • @nathansherrard4111
      @nathansherrard4111 4 роки тому +1

      Thanks for filling in that missing piece! (and quickly)

  • @huizhao2050
    @huizhao2050 2 роки тому

    Can you please define what is the back channel and front channel? I can't find them online.

  • @JW-qd3ol
    @JW-qd3ol Рік тому +1

    That was super interesting!!! Thank you!!

    • @OktaDev
      @OktaDev  Рік тому

      Glad you enjoyed it!

  • @samkachar
    @samkachar 2 роки тому +1

    As of today this only has 25k views. That seems on par to a war crime. Great video and the editing was done fairly well. The cut that was done toward the end was terrible however.

  • @michellewang3286
    @michellewang3286 4 роки тому

    Hello, can you explain more about ''Front channel benefits: application without public ip can receive data''
    Thank you!!

  • @tanveer867
    @tanveer867 4 роки тому

    Wonderful Explanation. Thanks for taking time and explaining this.

  • @michaelfournier4996
    @michaelfournier4996 2 роки тому

    Thanks for this easy to understand explanation.

  • @YeeModz
    @YeeModz 4 роки тому

    ive recreated it but I dont figure out how to acess there account need help i mean how to connect my acc with theres

  • @limitless707
    @limitless707 4 місяці тому

    How do you know if aomeone has oauth?

  • @sawanbhan
    @sawanbhan 4 роки тому +2

    Supercool presentation!!

  • @mryildiz702
    @mryildiz702 2 роки тому

    It's a really good video.
    Also, bought your Udemy course.
    I think I'm gonna learn a lot from you :)

  • @egelev
    @egelev 3 роки тому

    I admire your work. Explaining all these concepts in just 25 minutes is remarkable. Thank you.
    I still have a question. How does PKCE solve the problem of impersonating a client? There is no secret but the client_id is still public. What stops me from stealing the client_id, generating my own secret, hashing it, and building an URL that I can send to the user presenting myself as the client whose client_id I just stole? How does the OAuth server know that the randomly generated hash secret that comes in pair with a particular client_id is actually coming from the client who owns this client_id?

    • @aaronpk
      @aaronpk 3 роки тому +3

      Thanks! PKCE doesn't claim to solve that problem, client impersonation is a different problem. What PKCE does is ensures that the particular client that makes the request to the token endpoint is the same one that made the first request to the authorization endpoint. Client impersonation is a difficult problem to solve, and right now most things in the wild rely on the fact that it's relatively hard to take over a redirect URL on someone's phone and also get them to start a flow in the attacker's app.

    • @egelev
      @egelev 3 роки тому

      @@aaronpk Thank you. I appreciate the fast response :).

    • @Tomsta17
      @Tomsta17 2 роки тому

      @@aaronpk Thanks for clarifying the answer to that question. This is something I have been trying to get a solid answer on for some time now and I did not see how PKCE could help this case.
      I think I may have been previously misinterpreting claims on the purpose of PKCE.
      It's confusing to me because in your video at 9:20, you explain that the result of the Twitter hack was that anybody could impersonate the Twitter app, and how this hack was a major problem with OAuth 1 and a huge motivator to develop OAuth2.
      Yet it seems that OAuth2 (or PKCE) does not claim to mitigate this problem?
      I am still confused :)

    • @aaronpk
      @aaronpk 2 роки тому +1

      @@Tomsta17 It's confusing! So the core problem with OAuth 1 was that everything about it relied on the assumption that the application would be deployed with its own secret. As soon as you try to do that with native apps, the secret isn't secret anymore, so it just breaks down completely. What OAuth 2 did was recognize that some apps don't have the ability to keep a secret, and stops pretending like they can. So while OAuth 2 doesn't solve the app impersonation problem completely, it makes it so that you're aware of the problem and provides guidance on other ways to avoid the issue, primarily using app-claimed HTTPS URLs.
      But indeed, PKCE has nothing to do with app impersonation, instead it solves other problems even if the app does have its own secret.

    • @Tomsta17
      @Tomsta17 2 роки тому

      @@aaronpk Now THAT makes sense :)
      I was still under the impression that PKCE was somehow trying to "Fix problem A", but instead, all we are now doing is saying:
      "Problem A is still a problem and will always be a problem (Until we have magic secure client secret storage). But you should know about Problem A, and stop relying on it. Find another way".
      Kinda?
      That really changes my outlook, so thanks.
      And thanks for the speedy response!

  • @MarkusSchaber
    @MarkusSchaber 3 роки тому +1

    Around 10:00 to 10:10: Why don't users have access to the source code of web based apps? It's JavaScript files which can be downloaded using tools like wget or inspect it on the fly using the developer tools provided by browsers.

    • @aaronpk
      @aaronpk 3 роки тому +2

      That should have been specifically web-*server* based apps, like the traditional way of developing apps before SPAs became popular... server-side languages like .NET, Java, PHP, etc.

    • @MarkusSchaber
      @MarkusSchaber 3 роки тому +2

      @@aaronpk Ah, so its the server calling to the other server, I see. :-)

    • @johntrent018
      @johntrent018 2 роки тому

      I'm not confirming anything right now as I'm still learning but I've made a first test of Google oauth2 connection through a ReactJS SPA and I've been able to get data from Google and client secret isn't even mentioned in source files, only client id. It's the Google auth server who will check for this.
      I may say mistakes as I'm still learning

  • @theone_031
    @theone_031 4 роки тому

    great explanation!! Thanks a lot.

  • @-q-b0_1
    @-q-b0_1 4 роки тому

    Great explanation

  • @fairyroot1653
    @fairyroot1653 4 роки тому +1

    I love your T-shirt

  • @pleasethink4789
    @pleasethink4789 Рік тому

    Great content AND def not for the uninitiated (at least not in a 25 minute video).

  • @karthibalaji3817
    @karthibalaji3817 4 роки тому

    Splendid !

  • @AlphaCybersecurity
    @AlphaCybersecurity 4 роки тому +1

    Thank you for this explanation. Clear and easy to understand!

    • @1nf0calypse
      @1nf0calypse 2 роки тому

      . I. Ziemlich z ??.?? ?I ended this?

  • @monzermasri4490
    @monzermasri4490 3 роки тому

    amazing content

  • @maxx.mazzeo
    @maxx.mazzeo 2 роки тому

    I just realize that thanks to hackers we might get improvements in any computer related applications, and this happens all the time.

  • @scottbiggs9846
    @scottbiggs9846 4 роки тому

    Not happy with your analogy. I get that the front desk is the Authorization Server, but who's the Resource Owner? Is it "me"? It seems like "me" is the client, not the RO. Where does the RO get to express their consent to the transaction? No, definitely not happy with this analogy--just seems to muddy the waters even more. It's been two weeks, and I'm still confused.
    Like the rest of the vid though. Thanks

    • @aaronpk
      @aaronpk 4 роки тому +1

      You're right that this analogy doesn't have a good way to distinguish between the resource owner and the client, but "you" as the hotel guest are playing both roles. Consent is only one aspect of the OAuth flow and also isn't really represented here. The main thing this analogy shows is how access tokens are like a hotel key, issued by the front desk (authorization server) and read/consumed by the doors (resources), and that only the front desk and the door need to know how they work.

  • @paulclay6055
    @paulclay6055 2 роки тому +1

    Great video, I would like it but I like the number its at (666)

  • @davida.7586
    @davida.7586 3 роки тому

    Super!!!

  • @danielidonchangeambecauseo7889
    @danielidonchangeambecauseo7889 2 роки тому

    please don't read and ignore. I didn't even understand anything ... But I'm familiar with the terms . Who is going to train me on this field. I'm willing to put in the time ...

  • @toolshack21
    @toolshack21 4 роки тому

    awesome

  • @karoladamkiewicz5355
    @karoladamkiewicz5355 2 роки тому

    glich me do sea huge festive cat litle to my best pet