YoVDO

Attacking Software Tokens

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Ethical Hacking Courses Reverse Engineering Courses Two-Factor Authentication Courses Dynamic Analysis Courses Static Analysis Courses

Course Description

Overview

Explore techniques for attacking software-based two-factor authentication tokens in this conference talk from HITB Security Conference. Delve into the vulnerabilities of smartphone OTP generator apps as they replace traditional hardware tokens. Learn about various attack methods, including static and dynamic analysis, custom kernel sandboxes, and full-system emulation. Examine proof-of-concept exploits targeting major vendors' soft tokens and understand how to assess the effectiveness of obfuscation techniques. Gain insights from Bernhard Mueller, an experienced hacker with a track record of discovering zero-day flaws and developing innovative attacks on core Internet protocols.

Syllabus

#HITBGSEC 2016 SG Conference Track D1 - Attacking Software Tokens - Bernhard Mueller


Taught by

Hack In The Box Security Conference

Related Courses

Teaching Impacts of Technology: Global Society
University of California, San Diego via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning
Learning Computer Security and Internet Safety
LinkedIn Learning
Learning Mobile Device Security
LinkedIn Learning