Building OAuth integrations is quite complicated and can be migraine-inducing - specifics vary between implementations, and security is easy to get wrong. In this article, I walk through what you need to make sure you're thinking about.
Credential re-use is rampant, and every post-exploitation action that gets you credentials for potential lateral movement is a win in my book. Learn how to grab stored enterprise wifi credentials from compromised machines.