Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Real-World Look at an OAuth Attack

Red Canary via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a comprehensive 32-minute cybersecurity webinar that examines OAuth application security threats through real-world analysis. Learn to differentiate between legitimate and malicious OAuth applications as Red Canary's threat hunting experts Alex and Harrison guide you through concerning trends in AI email applications that request excessive permissions. Discover how OAuth tokens can remain active even after password changes through a detailed case study, and understand the critical importance of auditing application permissions. Master techniques for identifying and removing potentially malicious apps while learning to trust established vendors to mitigate OAuth-related security risks. Gain practical insights into Azure OAuth fundamentals, examine specific abuse patterns, and develop skills for conducting thorough OAuth application audits to protect your organization from sophisticated cyber attacks.

Syllabus

00:00 - 00:49 Intro
00:50 - 02:30 Welcome to Red Canary Office Hours
02:31 - 04:03 What is Azure OAuth?
04:04 - 09:43 Case Study
09:44 - 11:04 How OAuth's are abused
11:05 - 30:29 Auditing OAuth Apps
30:30 - 32:25 See you next time!

Taught by

Red Canary

Reviews

Start your review of A Real-World Look at an OAuth Attack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.