YoVDO

Authentication Proxy Attacks: Detection, Response and Hunting

Offered By: BSidesLV via YouTube

Tags

Cybersecurity Courses Incident Response Courses Multi-Factor Authentication Courses Phishing Courses Threat Detection Courses Threat Hunting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolving landscape of authentication proxy attacks in this 46-minute conference talk from BSidesLV. Delve into the history of evilnginx and its impact on stealing authentication session tokens from MFA-enabled logon processes. Examine the recent rise of EvilProxy and similar platforms, which have enabled cybercriminals to compromise targets with strong authentication without resorting to traditional methods. Learn about the tactics, tools, and procedures used in MFA-enabled account takeovers, and discover the inherent weakness in these attacks that allows for effective hunting, detection, mitigation, and blocking. Gain valuable insights into protecting organizations against these sophisticated threats, especially in sectors where phish-resistant MFA adoption is still emerging.

Syllabus

BG - Authentication Proxy Attacks: Detection, Response and Hunting


Taught by

BSidesLV

Related Courses

TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Threat Hunting with Yara
Pluralsight
Enterprise Security: Policies, Practices, and Procedures
Pluralsight
Managing and Responding to Security Events Using Azure Sentinel
Pluralsight