Pakistan Card
Pakistan Card
Two-Factor Authentication
Roger Grimes
Data-Driven Defense Evangelist,
KnowBe4, Inc.
rogerg@knowbe4.com
About Roger
• 30-years plus in computer security
• Expertise in host and network security, IdM, crypto,
PKI, APT, honeypot, cloud security
• PKI, smartcards, 2FA since 1998
• Consultant to world’s largest and smallest
companies and militaries for decades
• Previous worked for Foundstone, McAfee, Microsoft
• Written 10 books and over 1000 magazine articles
• InfoWorld and CSO weekly security columnist since
2005
• Frequently interviewed by magazines (e.g.
Newsweek) and radio shows (e.g. NPR’s All Things
Roger A. Grimes Considered)
Data-Driven Defense Evangelist Certifications passed include:
KnowBe4, Inc. • CPA
• CISSP
• CISM, CISA
• MCSE: Security, MCP, MVP
• CEH, TISCA, Security+, CHFI
• yada, yada
About Us
• The world’s most popular integrated Security Awareness
Training and Simulated Phishing platform
Over
17,000
• Based in Tampa Bay, Florida, founded in 2010
• We help thousands of
organizations manage the
problem of social
engineering
Roger’s Books
Today’s Presentation
• Two-Factor Authentication Intro
• Hacking 2FA
• Defending Against 2FA Attacks
Two-Factor Authentication Intro
Introduction to Two-Factor Authentication
• Something You Know
Session
Hijacking
2FA Hacks
Kevin Mitnick Hack Demo
1. Kevin set up fake look-alike/sound-alike web site that was really an evil
Session proxy
Hijacking 2. Tricked user into visiting evil proxy web site
3. User typed in credentials, which proxy, now pretending to be the legitimate
customer, presented to legitimate web site
4. Legitimate web site sent back legitimate session token, which Kevin then
stole and replayed to take over user’s session
• Kevin used Evilginx (https://breakdev.org/evilginx-advanced-phishing-with-
two-factor-authentication-bypass/)
• One example hack out of the dozens, if not hundreds of ways to do session
hijacking, even if 2FA is involved
2FA Hacks
Man-in-the-Endpoint Attacks
Endpoint • Start up a second session that the user isn’t even aware
Attacks • Ex. Bancos trojans
2FA Hacks
• Most “random” number generators start with a randomly generated
Buggy 2FA
2FA Hacks
2017 ROCA vulnerability
• Sometimes a single bug impacts hundreds of millions of
Buggy 2FA otherwise unrelated 2FA devices
» Learn More at «
www.KnowBe4.com/Resources
19
Questions?