Quick Start
New to OAuth security? Start with the Control Panel for a visual introduction, then move to Dual Perspective for deeper understanding, and finally explore Request Forge for hands-on technical practice.
Start LearningInteractive Security Education
Explore common OAuth vulnerabilities in a safe, controlled environment. Understand how attacks work and learn to defend against them through hands-on interactive modules.
_ _____ _____ _ ____ _ __ _ _ ____
/ \|_ _|_ _|/ \ / ___| |/ / | | / \ | __ )
/ _ \ | | | | / _ \| | | ' / | | / _ \ | _ \
/ ___ \| | | |/ ___ \ |___| . \ | |___/ ___ \| |_) |
/_/ \_\_| |_/_/ \_\____|_|\_\ |_____/_/ \_\____/
Each module offers a different approach to learning OAuth security. Pick the one that matches your learning style.
Toggle-Based Defense Learning
Toggle security controls on and off to see which attacks succeed or fail. Visual feedback shows cause-and-effect relationships between configuration and security.
Full Simulation Environment
A desktop-style environment with multiple windows: Flow Diagram to visualize attacks, Terminal to execute commands, and Request Inspector to analyze traffic. The ultimate hands-on hacking experience.
Story-Driven Scenario Learning
Experience attacks from both attacker and defender perspectives. Navigate through branching narratives with decision points and see how security configurations affect outcomes.
Technical Hands-On Sandbox
Build and send OAuth requests at the protocol level. Modify parameters, analyze responses, and decode JWTs with detailed security annotations. Compare secure vs insecure configurations side-by-side.
These are the most common OAuth 2.0 vulnerabilities. Each module covers all of these attacks.
Attacker intercepts authorization codes during redirect and exchanges them for tokens.
Attacker modifies redirect_uri to steal authorization codes via phishing.
Attacker replays tokens against services that don't validate audience claims.
Attacker forces victim to complete OAuth flow with attacker's code.
Attacker manipulates scope parameter to gain elevated permissions.
Attacker exploits XSS to steal tokens from browser storage.
Attacker forges tokens by switching signing algorithm from RS256 to HS256.
Attacker steals refresh token for persistent access that survives password changes.
Attacker uses OAuth endpoint as open redirector for convincing phishing URLs.
Attacker steals codes in multi-IdP scenarios by confusing which AS issued them.
Attacker tricks users into clicking hidden authorize button via iframe overlay.
New to OAuth security? Start with the Control Panel for a visual introduction, then move to Dual Perspective for deeper understanding, and finally explore Request Forge for hands-on technical practice.
Start Learning