Главная
Study mode:
on
1
Intro
2
Phish the Phishers
3
Social Attacks
4
Account Takeover Objectives
5
The Phishing Ecosystem
6
Research Objectives
7
The Research Process
8
Our Baits Network
9
Make Accounts Authentic
10
Account Monitoring
11
Trace Login Attempts
12
Credential Leakage
13
Account Penetration
14
Access Time
15
Password Reuse Practices
16
Effectiveness of Traps
17
Account Abuse
18
Story Time - Full account takeover
19
Manual or Automated?
20
Covering the tracks
21
Geo Distribution
22
Investigating incident
23
Conclusions
24
Human is Human
25
CISO Takeaways
Description:
Explore the dynamics of credential theft and account takeovers in this 49-minute conference talk from AppSecUSA 2017. Dive into a unique "victim's POV" research approach that traces attacker activity after compromising 57 fake identities on popular platforms like Google and Facebook over a 6-month period. Discover key insights on takeover timelines, attacker behavior patterns, and security practices employed by hackers. Learn about the phishing ecosystem, research objectives, and the process of creating authentic bait accounts. Analyze findings on access times, password reuse, trap effectiveness, and geographic distribution of attacks. Gain valuable takeaways for CISOs and cybersecurity professionals to enhance defense strategies against sophisticated phishing campaigns and account compromises.

Beyond Takeover - Attacker's In. Now What?

OWASP Foundation
Add to list
00:00
00:00