OAuth Misconfiguration found in small time-window of attack

Request prone to the replay attack

--

--

--

Cybersecurity Professional / Researcher from Pakistan

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

HITRUST Security Automation

Completion of Phase 1 & 2 Hydro Token Redistribution

🏆The 1000x Pika🏆

MyKidsSuperannuation, Name : My Kid’s Superannuation 😍🤩 TG: t.me/mykidssuper

Google's Advanced Protection Program with iPhone and iPad

Learn & Earn with Fuse Network: Quiz Result & Winners List

TryHackMe write-up: Smag Grotto

How to Claim and Stake after the LGE

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Muhammad Aamir

Muhammad Aamir

Cybersecurity Professional / Researcher from Pakistan

More from Medium

Testing WebSockets for Vulnerabilities {Part-2} The Setup.

Learning SQL Injection in Oracle Databases

Vulnhub BreakOut — A Detailed Walkthrough.

Write-up: SQL injection UNION attack, determining the number of columns returned by the query @…