Главная
Study mode:
on
1
Intro
2
Password manager poll
3
Why hackers are interested in this
4
Financial fraud theft
5
Account takeover
6
Virtual currency
7
Spam
8
Twitter
9
Other breaches
10
Techniques
11
Credential stuffing
12
Adobe breach
13
Great website hack
14
Username database
15
Credentials
16
Email verification
17
Password dump
18
Code level vulnerabilities
19
Password managers
20
Ways to protect yourself
21
Strong login process
22
U2F
23
Phone apps
24
Brute force attacks
25
Balancing act
26
Rate limiting
27
Threat intelligence
28
Volume of attempts
29
JavaScript
30
Browser Fingerprint
31
User profiles
32
Sentry mba
33
Netflix
34
Spotify
35
CAPTCHAs
36
WTF
37
Local deployment
38
Credential dump database
39
Credential dump files
40
Resources
Description:
Explore the critical issue of account takeover (ATO) attacks in this 47-minute LASCON conference talk. Delve into the long-term impact of hacks like the 2012 LinkedIn breach, which resulted in a two-phase attack spanning years. Learn about the collection and compromise phases of ATO attacks, and how hackers use bots to exploit stolen data across multiple networks. Discover various approaches to combat ATO, including threat intelligence, rate limiting, and anomaly detection. Gain insights from IMMUNIO CTO Mike Milner on attacker tactics, such as evading rate limits and bypassing CAPTCHA protection. Understand the financial implications of ATO attacks and the importance of maintaining user trust. Examine different security measures, from strong login processes to U2F and phone apps, and explore the balance between security and user experience. Get introduced to a new tool for experimenting with Credential Stuffing attacks and learn how to build better defenses by understanding attacker methodologies. Read more

Why the LinkedIn Hack Could Be Your Biggest AppSec Threat

LASCON
Add to list
0:00 / 0:00