Stuck in Tutorial Hell? Learn Backend Dev the Right Way
MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a Black Hat conference talk that unveils a client impersonation vulnerability discovered in Google's "first-party" applications. Delve into the speaker's journey of identifying this security flaw in early 2021, which allows attackers to masquerade as trusted applications to both users and Google itself. Learn about the implications of this vulnerability, including how it grants unauthorized privileges to malicious actors. Examine the broader context of enterprise security practices, including instances of ignored RFCs and mishandled sensitive information. Gain insights into the complexities of cloud provider security models and the potential consequences of overlooking critical security measures. This 48-minute presentation by Brian Smith-Sweeney offers a compelling narrative that serves as a wake-up call for security practitioners across various industries.
Syllabus
The Accidental Discovery of a New Vulnerability in Google's OAuth Implementation
Taught by
Black Hat