Short Summary
The video discusses the risks associated with using third-party login services, such as Google, Microsoft, or Facebook, for accessing various websites. It highlights how a hacker could exploit these connections to gain unauthorized access to a user’s account even without knowing their username or password.
Key Points
- Third-party logins allow users to access sites without direct username and password entry.
- A hacker can create a new Google account and connect it to a user’s existing account, enabling ongoing access.
- Changing passwords alone may not suffice; users need to check all connected services and alternate logins.
- Some sites may offer API key generation, which can also be exploited for unauthorized access.
- The potential exists for a “ghost login” that could persist for years, even after password changes.
Youtube Video: https://www.youtube.com/watch?v=NwFlGXoEXgE
Youtube Channel: Jack Rhysider
Video Published: 2024-12-03T19:57:41+00:00