

Episode 110: Oauth Gadget Correlation and Common Attacks
Feb 13, 2025
This discussion dives into the intriguing world of OAuth vulnerabilities and the tactics hackers employ to exploit them. It highlights a critical bypass in DOMPurify, explores AI's role in vulnerability testing, and underscores the importance of secure API key management. The speakers examine OAuth flows and common attack vectors, sharing insights on enhancing security practices. Additionally, they reveal shocking vulnerabilities in Azure AD, demonstrating the risks of inadequate token validation. It's an engaging mix of technical insights and community-driven education.
AI Snips
Chapters
Transcript
Episode notes
DOMPurify Comment Bypass Insight
- DOMPurify bypasses often stem from inconsistent comment handling between the sanitizer and browser.
- Simplifying complex bypasses to primitives aids reuse and understanding of XSS exploitation.
Use AI for Iterative Hacking
- Use iterative testing combined with AI models like O3 mini to optimize vulnerability discovery.
- Combine verbose error messages and past payload diffs to guide AI in generating new payloads.
Probe Authentication Deeply
- Investigate authentication mechanisms in chat or plugin systems deeply beyond simple ID swaps.
- Pay careful attention to API key usage to identify potential secret leaks and authorization flaws.