Member-only story

Attacking OAuth

Angelo Pio Amirante
InfoSec Write-ups
Published in
5 min readMay 9, 2024

OAuth Basics

OAuth2 is a web standard used for authorization between services, allowing third-party apps to access services or data from providers like Google or Facebook without users sharing their passwords. It enhances security and privacy by enabling users to control access to their resources through tokens issued by the authorization server.

OAuth components

  • Resource Owner: The entity that guarantees access to the protected resource. Typically, this is the end user.
  • Client: An application requesting access to a protected resource on behalf of the Resource Owner. This is also called the Relying Party.
  • Resource Server: The server hosting the protected resources. These are the APIs we want to access.
  • Authorization Server: It is responsible for authenticating the resource owner and retrieving access tokens after obtaining the proper authorization. It’s also called the Identity provider.
  • User Agent: The agent used by the resource owner to interact with the client, such as a browser or a mobile app.

How does it work?

In OAuth, the user (resource owner) grants a third-party application (client) permission to access their protected resources stored on another service (resource server)…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Responses (1)

Write a response

Interesting!

--