Главная
Study mode:
on
1
Intro
2
Facts and Figures about Airlock & Ergon
3
OWASP Top 10
4
Upfront Web Application Security
5
Upfront Authentication
6
Strong Authentication Examples: OTP
7
Strong Authentication Examples: C/R
8
Trivial: Feedback Messages
9
Trivial Remedy: Generic Feedback Message
10
How About 2-Factor Authentication?
11
Requirements
12
Step 1: Simulate 2nd Factor with OTP
13
Step 1: Simulate 2nd Factor with MTAN
14
Account Locked Information
15
Simulate for unknown users
16
Step 3: Unknown users with different 2nd factors
17
What we implemented
18
Some Implementation Details
19
Configuration
20
Usability Considerations
21
Prevent other hidden channels
22
Conclusion
Description:
Explore a conference talk on implementing "stealth" authentication techniques to enhance web application security. Learn how to prevent information leakage during authentication processes, potentially thwarting hackers' attempts to exploit vulnerabilities. Discover the OWASP Top 10 security risks, upfront web application security measures, and strong authentication methods like OTP and challenge-response. Examine practical examples of implementing two-factor authentication, simulating second factors for unknown users, and handling account lockouts securely. Gain insights into usability considerations, configuration options, and strategies to prevent hidden information channels. Enhance your understanding of advanced authentication security practices to better protect web applications from potential threats.

Stealth Authentication: Preventing Information Leaks in Web Application Security - APPSEC CA 2017

OWASP Foundation
Add to list