Тёмный

Breaking FIDO: Are Exploits in There? 

Black Hat
Подписаться 225 тыс.
Просмотров 7 тыс.
50% 1

by Jerrod Chong
The state of authentication is in such disarray today that a black hat is no longer needed to wreak havoc. One avenue to authentication improvement is offered by the FIDO Alliance's open specifications built around public key cryptography. Does FIDO present a better mousetrap? Are there security soft spots for potential exploitation, such as man-in-the-middle attacks, exploits aimed at supporting architecture, or compromises targeting physical hardware? We will pinpoint where vulnerabilities are hidden in FIDO deployments, how difficult they are to exploit, and how enterprises and organizations can protect themselves.

Опубликовано:

 

25 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 2   
@benjamind7290
@benjamind7290 3 года назад
This is outstanding. Extremely clear and crisp. Really zooming in on the biggest elephant.
@noyes.
@noyes. 2 года назад
I didn’t hear a single exploit
Далее
FIDO2 - Creating a passwordless future
55:24
Просмотров 16 тыс.
WebAuthn 101 - Demystifying WebAuthn
26:28
Просмотров 16 тыс.
Finger Heart - Fancy Refill (Inside Out Animation)
00:30
Demystifying the Secure Enclave Processor
47:39
Просмотров 20 тыс.
How FIDO2 and WebAuthn Stop Account Takeovers
44:29
Просмотров 31 тыс.
My Invisible Adversary: Burnout
40:39
Просмотров 3 тыс.
A Software Defined Radio (SDR) Approach to Radar
10:43
Getting Started with WebAuthn with Nick Steele
54:33
Просмотров 17 тыс.
Iran's Soft-War for Internet Dominance
51:44
Просмотров 2,2 тыс.
Finger Heart - Fancy Refill (Inside Out Animation)
00:30