Главная
Study mode:
on
1
Introduction
2
How Much Does It Cost
3
Distribute Globally
4
Cost
5
Rate Of Return
6
How To Start
7
What Are Combo Lists
8
IP Rate Limiting
9
CAPTCHAs
10
Dynamic Sites
11
Host Header Order
12
Consumer Browsers
13
Browser fingerprinting
14
Fraudfox
15
Identifying Bots
16
NonHuman Behavior
17
Browser Automation Studio
18
Browser Consistency Check
19
Browser Fingerprints
20
Emulation
21
Multifactor authentication does not stop credential stuffing
22
How to bypass multifactor authentication
23
Logging into your bank
24
Resident script
25
Browser extensions
26
Exploit a developer machine
27
What is beyond credential stuffing
28
We are raising the cost
29
Genesis
30
One Unit
31
Known Resources
32
Fingerprints
33
Risk Scores
34
Dont Screw Your Buddies
35
Advanced Malware
36
Fraud Problems
Description:
Explore the current landscape of credential stuffing attacks and the evolving nature of account takeovers in this comprehensive conference talk. Delve into the economics of these attacks, including costs, distribution methods, and return on investment. Learn about combo lists, various defense mechanisms like IP rate limiting and CAPTCHAs, and the challenges posed by dynamic sites. Examine techniques used to identify bots, including browser fingerprinting and non-human behavior detection. Discover how attackers bypass multifactor authentication and explore advanced fraud techniques such as resident scripts and browser extensions. Gain insights into emerging threats beyond credential stuffing, including Genesis marketplaces and advanced malware. Understand the importance of risk scoring and collaborative efforts in combating fraud.

The State of Credential Stuffing and the Future of Account Takeovers

OWASP Foundation
Add to list
00:00
-41:02