Главная
Study mode:
on
1
Introduction
2
About me
3
About Evilginx
4
How does it work
5
What does the user see
6
How to bypass multifactor authentication
7
What can be done
8
The Fishing Domain
9
JavaScript Detections
10
How Evilginx Works
11
Dynamic Code Obfuscation
12
String Obfuscation
13
Summary
14
Secret Tokens
15
Basic Protection Code
16
Google
17
Secret tokens unspoofable
18
Demo
19
Recap
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn about reverse proxy phishing attacks and evolving defense mechanisms in this 33-minute conference talk from x33fcon. Explore the inner workings of Evilginx, a tool that has been at the forefront of MFA bypass attacks for the past six years. Discover how these attacks circumvent multi-factor authentication, examine what users experience during an attack, and understand why current web security measures have struggled to counter this threat effectively. Delve into practical defense strategies including JavaScript detections, dynamic code obfuscation, string obfuscation, and the implementation of secret tokens. Follow along with demonstrations and code examples showing basic protection mechanisms, with special attention to Google's approach to making secret tokens unspoofable. Master essential knowledge for defending against sophisticated phishing attacks that continue to pose significant risks to organizational security.

How Much Is The Phish? Evolving Defenses Against Evilginx Reverse Proxy Phishing

x33fcon
Add to list