Главная
Study mode:
on
1
Intro
2
Windows Hello (for Business)
3
Windows Hello for Business key points
4
Windows Hello for Business flavours
5
Azure AD native WHFB
6
Azure AD WHFB provisioning - PIN setup
7
WHFB Provisioning-technical components
8
WHFB Provisioning token requirements
9
WHFB provisioning response
10
Signed assertion with WHFB private key
11
Analyzing WHFB security
12
Analyzing key provisioning
13
Key provisioning flaws
14
Attack schematics
15
Get token with SSO data
16
Provisioning a new WHFB key
17
WHFB key storage
18
Registering WHFB keys directly on users
19
Registering a new WHFB key
20
Attack method: device code phishing
21
Alternative scenarios
22
WHFB Hybrid
23
WHFB Cloud Kerberos Trust
24
Lateral movement with WHFB
25
Request PRT for hybrid user
26
TGT Upgrade reply
27
Kerberos Key Trust consequences
28
Windows Hello for Business - conclusions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the internals and security aspects of Windows Hello for Business (WHFB) authentication protocol in this 41-minute conference talk from x33fcon. Dive deep into how WHFB credentials function within Azure AD, examining key provisioning processes, technical components, and token requirements. Learn about different WHFB flavors including Azure AD native and hybrid implementations, PIN setup procedures, and cloud Kerberos trust mechanisms. Discover identified vulnerabilities, attack vectors like device code phishing, and lateral movement possibilities within WHFB environments. Understand the implications of key storage, registration processes, and SSO data manipulation while analyzing the security implications of Kerberos Key Trust and TGT upgrade mechanisms.

Windows Hello for Business Security Analysis and Authentication Protocol Deep Dive - Lecture 10

x33fcon
Add to list
0:00 / 0:00