Bug Bounty Reports Discussed cover image

The mindset for finding highs and crits in bug bounty with JR0ch17

Bug Bounty Reports Discussed

00:00

OAuth Attack Scenarios and Common Weaknesses

Jasmin outlines OAuth testing checklist: redirect_uri, state, code leakage techniques, and leveraging known research.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app