Главная
Study mode:
on
1
Intro
2
black hat USA 2021
3
SunBurst: Breach of the year
4
SunBurst APT
5
Persistence: APT VS. APT
6
Persistence in practice
7
What is SAML
8
Service Provider (SP)
9
Identity Provider (IP)
10
SAML token example
11
Back to Service Provider
12
SAML is all about decoupling
13
Golden SAML: In high level
14
Problem definition
15
MFA as a good solution reference
16
Hardware based solution
17
HSM for SAML: Scorecard
18
What if we can have multiple signers?
19
Threshold Signature Scheme (TSS)
20
Tribute to Dan Kaminsky
21
EC-DLP as a billiards game
22
Distributed EC-DLP: Doubles' billiards game
23
Threshold Signatures (TSS): 1 becomes 2
24
TSS SAML flow: In high level
25
TSS for SAML: Scorecard
26
Demo Architecture - Setup Phase
27
Demo Architecture - Signing Phase
Description:
Explore a Black Hat conference talk that delves into protecting authentication systems' core secrets from compromise. Learn about the vulnerabilities of "Golden Secrets" in multi-factor authentication (MFA) systems and discover innovative approaches to mitigate these risks. Examine the SunBurst APT attack, understand SAML token mechanics, and explore hardware-based solutions like HSMs. Dive into advanced concepts such as Threshold Signature Schemes (TSS) and their application in enhancing SAML security. Gain insights into distributed EC-DLP and witness a practical demonstration of TSS SAML flow, equipping you with knowledge to strengthen authentication systems against sophisticated attacks.

MFA-ing the Un-MFA-ble - Protecting Auth Systems' Core Secrets

Black Hat
Add to list
0:00 / 0:00