Authentication Proxy Attacks: Detection, Response and Hunting
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the evolving landscape of authentication proxy attacks in this 46-minute conference talk from BSidesLV. Delve into the history of evilnginx and its impact on stealing authentication session tokens from MFA-enabled logon processes. Examine the recent rise of EvilProxy and similar platforms, which have enabled cybercriminals to compromise targets with strong authentication without resorting to traditional methods. Learn about the tactics, tools, and procedures used in MFA-enabled account takeovers, and discover the inherent weakness in these attacks that allows for effective hunting, detection, mitigation, and blocking. Gain valuable insights into protecting organizations against these sophisticated threats, especially in sectors where phish-resistant MFA adoption is still emerging.
Syllabus
BG - Authentication Proxy Attacks: Detection, Response and Hunting
Taught by
BSidesLV
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy Offensive Security Engineering
Udemy Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn