Главная
Study mode:
on
1
Introduction
2
Multifactor Authentication
3
LocationBased Authentication
4
TwoFactor Authentication
5
Characters
6
Reactive Overview
7
Push Based Authentication
8
Proactive Defense
9
Next Level Attack
10
Solutions
Description:
Explore advanced phishing techniques targeting U2F-protected accounts in this 22-minute conference talk from BSides Tampa 2019. Delve into various multifactor authentication methods, including location-based and two-factor authentication, while examining the characteristics of reactive and push-based authentication systems. Gain insights into proactive defense strategies and next-level attack methodologies. Discover practical solutions to enhance security measures against sophisticated phishing attempts on accounts protected by Universal 2nd Factor (U2F) authentication.

Phishing U2F Protected Accounts

Add to list
0:00 / 0:00