Text
Hacking multifactor authentication
TABLE OF CONTENTS
Introduction xxv
Who This Book is For xxvii
What is Covered in This Book? xxvii
MFA is Good xxx
How to Contact Wiley or the Author xxxi
Part I Introduction 1
1 Logon Problems 3
2 Authentication Basics 33
3 Types of Authentication 59
4 Usability vs Security 101
Part II Hacking MFA 121
5 Hacking MFA in General 123
6 Access Control Token Tricks 141
7 Endpoint Attacks 163
8 SMS Attacks 181
9 One-Time Password Attacks 205
10 Subject Hijack Attacks 227
11 Fake Authentication Attacks 245
12 Social Engineering Attacks 259
13 Downgrade/Recovery Attacks 275
14 Brute-Force Attacks 295
15 Buggy Software 307
16 Attacks Against Biometrics 325
17 Physical Attacks 357
18 DNS Hijacking 377
19 API Abuses 399
20 Miscellaneous MFA Hacks 425
21 Test: Can You Spot the Vulnerabilities? 431
Part III Looking Forward 453
22 Designing a Secure Solution 455
23 Selecting the Right MFA Solution 473
24 The Future of Authentication 493
25 Takeaway Lessons 509
Appendix: List of MFA Vendors 521
Index 527
No other version available