Keep an eye out for URL parameters that include certain names, such as url=, redirect=, next=, etc. In some cases, redirect parameters might be labled with just single characters, such as r= or u=.
When a user accesses to a resource with unauthenticated session, web applications uasually redirect user to login form url which contains the link of the resource as a url parameter. When the user logs in successfully, these applications use the url parameter to redirect user to the url which user attend to access in the begining. Thereforce, the open redirect vulnerability uasually occurs in login form.
Bypass payload:
Some applications do filter, whitelist or blacklist the redirect parameter before performs it.