Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:1
DefCamp9
- 2018 -
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:2
“Trust, but verify”
– bypassing MFA
Mircea NENCIU
Stefan MITROI
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
What is MFA
Multi-factor
authentication (MFA)
represents a security
system in which
individuals are required
to authenticate through
more than one security
and validation
procedure.
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
History of MFA
With the ever increasing use of computer systems, people realized
that the information stored was sometimes very confidential in
nature. As such, better security was required something that didn’t
just reply on the memory of the user, something that was harder to
give away by mistake or could be extracted as a result of database
breaches.
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Authentication factors
 MFA is a method of granting access after confirming
the identity of the user by validating two or more
claims presented, each from a different category
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Authentication factors
 Something you know
 Something you have
 Something you are
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Deployment modules
 Something you know
 Password
 Passphrase
 Pin
 Secret questions
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Deployment modules
 Something you have
 Phone(call/SMS)
 Soft token
 Hard token
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Something you are
 Something you are
 Fingerprint
 Voice recognition
 Facial recognition
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Challenges
 Cost
 Confidentiality
 Availability
 Compatibility
 User convenience
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Meet Dave
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Securing Dave
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Security Incidents
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
POC
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
POC
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Bypassing SPAM filters
 Most popular enterprise email solution
Outlook/Office365
 Moving from an “on-prem” exchange to a hybrid or
full cloud model
 test@[domain].com vs test@[domain.]onmicrosft.com
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Bypassing SPAM filters
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Check compatibility
 Understand the network
 Legacy protocols
 Modern Authentication
 Continual service improvement
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
Q&A
Classification: //Secureworks/Public Use:© SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:
THANK YOU!

Trust, but verify – Bypassing MFA

  • 1.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:1 DefCamp9 - 2018 -
  • 2.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution:2 “Trust, but verify” – bypassing MFA Mircea NENCIU Stefan MITROI
  • 3.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: What is MFA Multi-factor authentication (MFA) represents a security system in which individuals are required to authenticate through more than one security and validation procedure.
  • 4.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: History of MFA With the ever increasing use of computer systems, people realized that the information stored was sometimes very confidential in nature. As such, better security was required something that didn’t just reply on the memory of the user, something that was harder to give away by mistake or could be extracted as a result of database breaches.
  • 5.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Authentication factors  MFA is a method of granting access after confirming the identity of the user by validating two or more claims presented, each from a different category
  • 6.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Authentication factors  Something you know  Something you have  Something you are
  • 7.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Deployment modules  Something you know  Password  Passphrase  Pin  Secret questions
  • 8.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Deployment modules  Something you have  Phone(call/SMS)  Soft token  Hard token
  • 9.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Something you are  Something you are  Fingerprint  Voice recognition  Facial recognition
  • 10.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Challenges  Cost  Confidentiality  Availability  Compatibility  User convenience
  • 11.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Meet Dave
  • 12.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Securing Dave
  • 13.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Security Incidents
  • 14.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: POC
  • 15.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: POC
  • 16.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Bypassing SPAM filters  Most popular enterprise email solution Outlook/Office365  Moving from an “on-prem” exchange to a hybrid or full cloud model  test@[domain].com vs test@[domain.]onmicrosft.com
  • 17.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Bypassing SPAM filters
  • 18.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Check compatibility  Understand the network  Legacy protocols  Modern Authentication  Continual service improvement
  • 19.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: Q&A
  • 20.
    Classification: //Secureworks/Public Use:©SecureWorks, Classification: //Secureworks/Confidential - Limited External Distribution: THANK YOU!