Attacking Software Tokens
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore techniques for attacking software-based two-factor authentication tokens in this conference talk from HITB Security Conference. Delve into the vulnerabilities of smartphone OTP generator apps as they replace traditional hardware tokens. Learn about various attack methods, including static and dynamic analysis, custom kernel sandboxes, and full-system emulation. Examine proof-of-concept exploits targeting major vendors' soft tokens and understand how to assess the effectiveness of obfuscation techniques. Gain insights from Bernhard Mueller, an experienced hacker with a track record of discovering zero-day flaws and developing innovative attacks on core Internet protocols.
Syllabus
#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller
Taught by
Hack In The Box Security Conference
Related Courses
Malware Analysis and Assembly Language IntroductionIBM via edX Advanced Malware Analysis: Redux
Cybrary Intro to Malware Analysis and Reverse Engineering
Cybrary RIP : Rétro-Ingénierie de Programmes
Université de Lille via France Université Numerique CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent