Objective:
- This lab object is designed to explore and identify vulnerabilities in OAuth implementations. Participants will
use a simulated environment where an OAuth 2.0 setup is implemented with intentional security flaws. The
objective is to detect, exploit, and suggest mitigations for these vulnerabilities.
Lab 8: Access control vulnerabilities - OAuth2.0
Name: Đào Quang Việt
ID: HE176173
Class: IA1803-AS
In this lab, students need to:
Answer the following questions:
o What is OAuth, and how does it facilitate authorization in modern web applications?
OAuth
OAuth (Open Authorization) is an open standard for access delegation commonly used for
token-based authentication and authorization in modern web applications. It allows third-party
services to access a user's resources without exposing their credentials (e.g., username and
password). OAuth is widely used by platforms like Google, Facebook, and GitHub to enable
secure login and data-sharing across different applications.
How OAuth Facilitates Authorization
OAuth facilitates secure authorization through a token-based approach, allowing users to grant
limited access to their data without sharing passwords
o Describe how consent phishing can be executed in an OAuth context. How can attackers
leverage OAuth permissions to gain unauthorized access to user data? Discuss strategies
that can be employed to detect and prevent consent phishing in OAuth
implementations.
Consent Phishing in an OAuth Context
Consent phishing is an attack where cybercriminals trick users into granting malicious
applications OAuth permissions, allowing attackers to access sensitive data without needing
credentials. Instead of stealing usernames and passwords, attackers exploit OAuth’s
authorization mechanisms to gain access to email accounts, cloud storage, or other services.
How Attackers Leverage OAuth Permissions
Email Access – Attackers gain access to the victim’s inbox, allowing them to read sensitive
information or send phishing emails.
Cloud Storage – They can download, modify, or delete files stored in cloud services.
Contacts & Social Media – Attackers can impersonate the victim, sending phishing
messages or spreading malware.
API Misuse – If the victim’s OAuth token has broad API access, attackers can manipulate
settings, exfiltrate data, or install malware.
Strategies to Detect and Prevent Consent Phishing
1. User Awareness & Training
2. OAuth Provider Security Enhancements
3. Implement Least Privilege and Restrictive Policies
4. Monitor and Revoke Suspicious OAuth Grants
5. Block Unauthorized OAuth Apps
6. Token Expiry & Revocation Policies
Perform challenge:
o Authentication bypass via OAuth implicit flow
Explain and capture all steps (full windows screen capture).
Đăng nhập tài khản wiener
Repeater POST authenticate
Thay đổi gmail của carlos và lấy link bowser
Pase vào thanh tìm kiếm và ta đã hoàn thành
Submit a report addressing all the questions mentioned above in either PDF or Markdown format.
Additionally, include a video demonstrating the detailed process of your work to ensure the
authenticity of your lab exercise.
The report file name must be Class_YourStudentID _YourName_Lab8