AppSec Blog: Daily Archives: Mar 07, 2011

Four Attacks on OAuth - How to Secure Your OAuth Implementation

This article briefly introduces an emerging open-protocol technology, OAuth, and presents scenarios and examples of how insecure implementations of OAuth can be abused maliciously. We examine the characteristics of some of these attack vectors, and discuss ideas on countermeasures against possible attacks on users or applications that have implemented this protocol. An Introduction to the … Continue reading Four Attacks on OAuth - How to Secure Your OAuth Implementation


Spot the Vuln - Flag

Every normal man must be tempted, at times, to spit upon his hands, hoist the black flag, and begin slitting throats. ~H.L. Mencken Spot the Vuln uses code snippets from open source applications to demonstrate vulnerabilities in real world web applications. Every Monday morning a vulnerable code snippet is posted. Take a look at the … Continue reading Spot the Vuln - Flag