OpenID Connect (OIDC) with OAuth allows applications to authenticate users using third-party identity providers (IdPs). If dynamic registration is enabled, attackers can abuse this feature to capture and replay authentication requests.
Replay attack (Option C):
Attackers capture legitimate authentication tokens and reuse them to impersonate users.
OIDC uses JWTs (JSON Web Tokens), which may not expire quickly, making replay attacks highly effective.
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "Attacking Identity Providers and OAuth", Incorrect options:, Option A (Password spraying): Effective against user accounts, but this attack targets authentication tokens., Option B (Brute-force attack): Less effective against OAuth-based authentication since tokens replace passwords., Option D (Mask attack): Related to password cracking, not OAuth authentication attacks., , ]
Submit