YoVDO

Trust, but Verify – Bypassing MFA – DefCamp – 2018

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Multi-Factor Authentication Courses

Course Description

Overview

Explore a comprehensive conference talk from DefCamp 2018 that delves into the intricacies of Multi-Factor Authentication (MFA) and its potential vulnerabilities. Learn about the history, deployment modules, and authentication factors of MFA, as well as its benefits and challenges. Follow the journey of a fictional character, Dave, to understand real-world MFA implementation and security incidents. Gain insights into proof-of-concept techniques for bypassing SPAM filters and checking compatibility. This 43-minute presentation, part of the prestigious DefCamp conference series on Hacking & Information Security in Central and Eastern Europe, offers valuable knowledge for decision-makers, security specialists, entrepreneurs, and developers alike.

Syllabus

Intro
What is MFA
History of MFA
Authentication factors
Deployment modules
Something you are
Benefits
Challenges
Meet Dave
Securing Dave
Security Incidents
POC
Bypassing SPAM filters
Check compatibility


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube