YoVDO

Attacking Software Tokens

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Ethical Hacking Courses Reverse Engineering Courses Two-Factor Authentication Courses Dynamic Analysis Courses Static Analysis Courses

Course Description

Overview

Explore techniques for attacking software-based two-factor authentication tokens in this conference talk from HITB Security Conference. Delve into the vulnerabilities of smartphone OTP generator apps as they replace traditional hardware tokens. Learn about various attack methods, including static and dynamic analysis, custom kernel sandboxes, and full-system emulation. Examine proof-of-concept exploits targeting major vendors' soft tokens and understand how to assess the effectiveness of obfuscation techniques. Gain insights from Bernhard Mueller, an experienced hacker with a track record of discovering zero-day flaws and developing innovative attacks on core Internet protocols.

Syllabus

#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller


Taught by

Hack In The Box Security Conference

Related Courses

Malware Analysis and Assembly Language Introduction
IBM via edX
Advanced Malware Analysis: Redux
Cybrary
Intro to Malware Analysis and Reverse Engineering
Cybrary
RIP : Rétro-Ingénierie de Programmes
Université de Lille via France Université Numerique
CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent