Главная
Study mode:
on
1
Intro
2
Roadmap
3
Introduction
4
An Evolving Multi-factor Landscape
5
Pre-Authentication: The Setup
6
Pre-Authentication: Casing the Joint
7
Real-Time Phishing with Reel Phish
8
Honorable mention: Exchange
9
Pre-Authentication - What MFA isn't
10
Pre-Authentication - Attack Phones
11
Post-authentication - Surveying the Land
12
Post-authentication - Making a New Set of Keys
13
Post-Exploitation - When The Attacker Has Everything
14
Post-Exploitation -Targeting MFA Management
15
Post-Exploitation - Targeting MFA Integration
16
Post-Exploitation - Fail Un safe?
17
Defense-in-Depth - Pre-Authentication
18
Defense-in-Depth - Post-Exploitation
19
Summary
Description:
Explore the evolving landscape of multi-factor authentication (MFA) schemes and learn techniques for both evading and protecting against advanced attacks in this 47-minute conference talk from Derbycon 2018. Delve into pre-authentication setups, real-time phishing methods, and post-authentication strategies for surveying and exploiting vulnerabilities. Examine post-exploitation techniques targeting MFA management and integration, and discover defense-in-depth approaches for pre-authentication and post-exploitation scenarios. Gain valuable insights into the complexities of modern MFA systems and how to strengthen security measures against sophisticated evasion tactics.

Two Factor Too Furious - Evading and Protecting Evolving MFA Schemes

Add to list
0:00 / 0:00