
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Hacking Multifactor Authentication
About this book
Protect your organization from scandalously easy-to-hack MFA security "solutions"
Multi-Factor Authentication (MFA) isspreading like wildfire across digital environments.However, hundreds of millions of dollars have been stolen from MFA-protected online accounts.How?Mostpeoplewho usemultifactor authentication (MFA)have been told thatitis far less hackablethan other types of authentication, or eventhat it isunhackable. You might beshocked to learnthatall MFA solutions areactually easy to hack.That's right: there is noperfectlysafe MFA solution.In fact, most can be hacked at leastfivedifferent ways. Hacking Multifactor Authentication willshow youhow MFA works behind the scenes and how poorlylinkedmulti-stepauthentication steps allowsMFA to be hacked and compromised.
Thisbook coversovertwodozenwaysthatvarious MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions.You'll learn about thevarious types of MFA solutions, their strengthens and weaknesses, andhowto pick the best, most defensible MFA solution foryour (or your customers') needs.Finally, this book revealsa simple methodforquickly evaluatingyour existing MFAsolutions.Ifusingor developing a secure MFA solutionis important to you, you need this book.
- Learn how different types of multifactor authentication work behind the scenes
- See howeasy it is to hack MFA security solutions—no matter how secure they seem
- Identify the strengths and weaknesses in your (or yourcustomers') existing MFA securityand how to mitigate
AuthorRoger Grimes is an internationally known security expert whose workon hacking MFA has generated significant buzz in the security world. Read this book to learnwhat decisions and preparationsyourorganization needsto take toprevent losses from MFA hacking.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
II
Hacking MFA
- Chapter 5: Hacking MFA in General
- Chapter 6: Access Control Token Tricks
- Chapter 7: Endpoint Attacks
- Chapter 8: SMS Attacks
- Chapter 9: One-Time Password Attacks
- Chapter 10: Subject Hijack Attacks
- Chapter 11: Fake Authentication Attacks
- Chapter 12: Social Engineering Attacks
- Chapter 13: Downgrade/Recovery Attacks
- Chapter 14: Brute-Force Attacks
- Chapter 15: Buggy Software
- Chapter 16: Attacks Against Biometrics
- Chapter 17: Physical Attacks
- Chapter 18: DNS Hijacking
- Chapter 19: API Abuses
- Chapter 20: Miscellaneous MFA Hacks
- Chapter 21: Test: Can You Spot the Vulnerabilities?
5
Hacking MFA in General
MFA Dependency Components

- Enrollment
- User
- Devices/hardware
- Software
- Authentication factors
- Authentication secrets store
- Cryptography
- Technology
- Network/transmission channel
- Namespace
- Supporting infrastructure
- Relying party
- Federation/proxies
- APIs
- Alternate authentication methods
- Recovery
- Migrations
- Deprovision
Enrollment
Table of contents
- Cover
- Table of Contents
- Introduction
- I: Introduction
- II: Hacking MFA
- III: Looking Forward
- Appendix: List of MFA Vendors
- Index
- End User License Agreement