Тёмный

Smishmash - Text Based 2fa Spoofing Using OSINT, Phishing Techniques and a Burner Phone 

Black Hat
Подписаться 229 тыс.
Просмотров 17 тыс.
50% 1

In recent years the data leaks have escalated, and leaked passwords and usernames have become a common attack vector in phishing attacks. Until recently phone numbers were commonly overlooked by attackers as well as red teams. This year has seen an increase in attacks circumventing text based 2fa.
In this talk, the researchers will show how it's possible to gather data from publicly available sources and connect the phone numbers most likely used by two factor authentication systems to other leaked email and login credentials.
Presented by: Thomas Olofsson & Mikael Byström
Full Abstract and Presentation Materials: www.blackhat.c...

Опубликовано:

 

16 ноя 2022

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
Qalpoq - Amakivachcha (hajviy ko'rsatuv)
41:44
Просмотров 437 тыс.
Свадьба Раяна Асланбекова ❤️
00:12
OSINT tools to track you down. You cannot hide.
57:45
Просмотров 707 тыс.
Cloud Design Patterns
3:40:10
Просмотров 797
Hackers EASILY see your password!
7:56
Просмотров 313 тыс.
Social Engineering - How Bad Guys Hack Users
14:58
Просмотров 53 тыс.
Is there a Phone Backdoor? (Pegasus, Simjacker, SS7)
21:34