twelve ways to defeat two-factor authentication · 2018-10-02 · kevin mitnick hack demo 1. kevin...

58
Twelve Ways to Defeat Two-Factor Authentication Roger Grimes Data-Driven Defense Evangelist, KnowBe4, Inc. [email protected]

Upload: others

Post on 10-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Twelve Ways to Defeat Two-Factor Authentication

Roger GrimesData-Driven Defense Evangelist, KnowBe4, [email protected]

Page 2: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

KnowBe4, Inc.• The world’s most popular integrated Security Awareness

Training and Simulated Phishing platform

• Based in Tampa Bay, Florida, founded in 2010

• CEO & employees are ex-antivirus, IT Security pros

• Former Gartner Research Analyst, Perry Carpenter is our Chief Evangelist and Strategy Officer

• 200% growth year over year

20,000Over

Customers• We help thousands of

organizations manage the problem of social engineering

Page 3: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Roger A. GrimesData-Driven Defense Evangelist

KnowBe4, Inc.

• 30-years plus in computer security• Expertise in host and network security, IdM, crypto,

PKI, APT, honeypot, cloud security• PKI, smartcards, 2FA, biometrics, since 1998• Consultant to world’s largest and smallest

companies and militaries for decades• Previous worked for Foundstone, McAfee, Microsoft• Written 10 books and over 1000 magazine articles• InfoWorld and CSO weekly security columnist since

2005• Frequently interviewed by magazines (e.g.

Newsweek) and radio shows (e.g. NPR’s All Things Considered)

About Roger

Certifications passed include:• CPA• CISSP• CISM, CISA• MCSE: Security, MCP, MVP• CEH, TISCA, Security+, CHFI• yada, yada

Page 4: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Roger’s Books

Page 5: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Using data-driven, risk analytics, I want to help companies put:

• The right defenses,

• In the right places,

• In the right amounts,

• Against the right threats

What is a Data-Driven Defense Evangelist?

Page 6: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

• Two-Factor Authentication Intro

• Hacking 2FA

• Defending Against 2FA Attacks

Today’s Presentation

Page 7: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Two-Factor Authentication Intro

Page 8: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Factors

• Something You Know

• Password, PIN, Connect the Dots, etc.

• Something You Have

• USB token, smartcard, RFID transmitter, dongle, etc.

• Something You Are

• Biometrics, fingerprints, retina scan, smell

Introduction to Two-Factor Authentication

Page 9: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Factors

• Single Factor

• Two Factor (2FA)

• 1.5 factor (slang for soft token vs. hard token)

• Multi-Factor (MFA)

• 2-3 factors

• Two or more of the same factor isn’t multi-factor

• Must be different types of factors to provide additional

protection

Introduction to Two-Factor Authentication

Page 10: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

MainAuthTypes

• Passwords, PINs, passphrases, etc.

• Password Managers

• Passwords Stored in Browser/Apps

• Authentication Proxies

• Federated (e.g. Open ID, Microsoft Passport, Facebook Connect)

• Graphical (e.g. Windows Hello, Picture Sequences)

Main Authentication Types

• Cognitive

• Paper Tokens

• Software Tokens (certs, etc.)

• Hardware Tokens

• Phone-Based

• Biometrics

• Recovery Methods

Can be 1FA, 2FA, or MFA, must consider usability, deployability, and security

Page 11: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Main2FATypes

Usually something you know (password, pin, etc.) plus something you know

• Software or Hardware

• “In-Band”

• Factor sent/validated using same channel as your authentication access check/app

• “Out-of-Band”

• Factor sent/validated using separate communication channel

Examples

• Digital Signatures, Digital certificates, public/private keys

• Biometrics (fingerprint, face, palm veins, retina print, handprint geometry, etc.)

• Dedicated external hardware token

• Smartcard, RFID, RSA SecureID, Yubikey, Trezor, Trusona, etc.

• Non-dedicated hardware

• Cell Phone

• One-time-password (OTP) over SMS, Goggle Authenticator, dedicated app

• Computer/device/portable media

• TPM chip, USB key

Introduction to Two-Factor Authentication

Page 12: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Factors

• All things considered, 2FA is better than 1FA

• We all should strive to use 2FA wherever and whenever possible

• But 2FA isn’t unhackable

• More on this later

We need to understand some basic concepts to better understand

hacking 2FA

Introduction to Two-Factor Authentication

Page 13: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Auth vs. Auth

• Identity

• Unique label within a common namespace

• indicates a specific account/subject/user/device/group/service/daemon, etc.

• Authentication

• Process of providing one or more factors that only the subject knows, thus proving ownership and control of the identity

• Authorization

• Process of comparing the now authenticated subject’s access (token) against previously permissioned/secured resources to determine subject access

Introduction to Two-Factor Authentication

Page 14: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Auth vs. Auth

Hugely Important Point to Understand

• No matter how I authenticate (e.g. one-factor, two-factor, biometrics, etc.), rarely does the authorization use the same authentication token

• They are completely different processes, often not linked at all to each other

• Many 2FA hacks are based on this delineation

For example

• Even if I authentication to Microsoft Windows using biometrics or a smartcard, after I successfully authenticate, an LM, NTLM, or Kerberos token is used for authorization/access control

• No matter how I authenticate to a web site, the authorization token is likely to be a text-based cookie (e.g. session token)

Introduction to Two-Factor Authentication

Page 15: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Auth vs. Auth

1-way vs. 2-way

Authentication can be:

• One-way

• server-only or client-only

• Most common type

• Vast majority of web sites use one-way authentication, where server has to prove its identity to client before client will conduct business with it

• With 2FA, client is usually proving identity to server

• But because server is not authenticated, rogue servers can be involved

• Two-way (mutual)

• Both server and client must authenticate to each other

• Not as common, but more secure

• Two-way may use different auth methods and/or factors for each side

Introduction to Two-Factor Authentication

Page 16: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Hacking 2FA

Page 17: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

General

Main Hacking Methods

• Social Engineering

• Technical Attack against underlying technology

• Some of the attacks are both

Some 2FA/MFA solutions are better than others, but there is no

such thing as “unhackable”

2FA Hacks

Page 18: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

• Usually requires Man-in-the-Middle (MitM) attacker

• Attacker puts themselves inside of the communication stream

between legitimate sender and receiver

• Doesn’t usually care about authentication that much

• Just wants to steal resulting, legitimate access session token after

successful authentication

• On web sites, session tokens are usually represented by a “cookie” (a simple text file containing information unique for the user/device

and that unique session)

• Session token usually just good for session

2FA Hacks

Page 19: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

• Session Hijacking has been around since computers have been

networked

• ARP spoofing, cookie stealing, URL tampering, etc.

• Bancos trojans did it in the early 2000’s

• Firesheep made it super popular and easy in 2010

• Defense against web-based session hijacking was for vendors to

use unpredictable cookie contents and to use HTTPS (SSL/TLS)

• Hackers got around

• Better defense was to use 2FA

• Hackers got around

2FA Hacks

Page 20: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

Common Session Hijacking Methods

Rogue Proxy/Server used to:

• Replay and Steal Credentials

• Steal Session Cookie

2FA Hacks

Page 21: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

Very common session hijacking method

1. Bad guy convinces person to visit rogue (usually name-alike)

web site, which proxies input to real web site

2. Prompts user to put in 2FA credentials

3. User puts in credentials, which bad guy relays to real web site

4. Bad guy logs into real site, and drops legitimate user

5. Takes control over user’s account

6. Changes anything user could use to take back control

2FA Hacks

Page 22: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

Kevin Mitnick Hack Demo

2FA Hacks

https://blog.knowbe4.com/heads-up-new-exploit-hacks-linkedin-2-factor-auth.-see-this-kevin-mitnick-video

Page 23: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Session Hijacking

Kevin Mitnick Hack Demo

1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy

2. Tricked user into visiting evil proxy web site

3. User typed in credentials, which proxy, now pretending to be the legitimate customer, presented to legitimate web site

4. Legitimate web site sent back legitimate session token, which Kevin then stole and replayed to take over user’s session

• Kevin used Evilginx (https://breakdev.org/evilginx-advanced-phishing-with-two-factor-authentication-bypass/)

• One example hack out of the dozens, if not hundreds of ways to do session hijacking, even if 2FA is involved

2FA Hacks

Page 24: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Endpoint Attacks

Man-in-the-Endpoint Attacks

• If endpoint gets compromised, 2FA isn’t going to help you

• Attacker can just do everything they want that the user is

allowed to do after successful authentication

• Steal session cookies

• Attacker can modify 2FA software to even steal 2FA secrets

• Smartcards and rogue CSPs

2FA Hacks

Page 25: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Endpoint Attacks

Man-in-the-Endpoint Attacks

• Start up a second session that the user isn’t even aware

• Ex. Bancos trojans

2FA Hacks

Page 26: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwapping

SIM Basics

• SIM stands for Subscriber Identity Module

• Most cell phone SIM cards store the cell phone network’s

information and the subscriber’s (user/owner) information, plus

can store app data

• If you move the SIM card to another cell phone, it transfers your

phone number and other info to that other cell phone

• Once done, “old” usually phone stops working

2FA Hacks

Page 27: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwappingAttacks

• Many, especially early, 2FA methods included sending

additional authentication code via a user’s cell phone short

message service (SMS)

• A SIM swapping attack can steal/transfer the user’s cell phone

operations to another phone, allowing the attacker to get the

sent the SMS code

• NIST (in SP 800-63) does not accept SMS codes as valid

authentication because of how easy it is to hack

2FA Hacks

Page 28: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwappingAttacks

• Has been successfully used in many of the world’s biggest

personal attacks

2FA Hacks

Page 29: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwappingAttacks

SIM Swapping Attack

• Attackers (using different methods) successfully transfer your SIM

information to their cell phone

• Often done by using social engineering:

• To your cell phone network provider’s tech support

• At local phone store or over phone

• May start with successful vishing/phishing to victim to retrieve

necessary cell phone account info

• Information may be collected by reviewing victim’s social media accounts

2FA Hacks

Page 30: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwapping

SIM Swapping Attack (con’t)

• Once SIM criminals have gathered enough info on victim, they call/visit the victim’s cellphone provider and claim that the SIM card has been lost or damaged or buy new phones using your identity

• They activate another SIM card/number using your info

• Most vendors ask for additional information, that usually the thief has learned, such as account pin/password, address, last four of ssn, and/or answers to password reset questions

• Once transferred, thief has control of phone and SMS

2FA Hacks

Page 31: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwapping

SIM Swapping Attack (con’t)

• Then thief logs into your 2FA account, and gets sent SMS

code, which they can respond with

2FA Hacks

Page 32: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

SIMSwapping

SIM Swapping Attack (con’t)

• Defense: Use non-SMS-based apps

• App travels with authenticated user, not phone number

or SIM

• Can’t be as easily transferred by 3rd party without your

knowledge or participation

• Not perfect, but stops easy SIM-swapping attacks

2FA Hacks

Page 33: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

DuplicateCode Generator

• Most 2FA code-generating tokens start with a (randomly) generated

(permanently) stored “seed” or “shared secret” value, which is then incremented by some sort of counter/algorithm which generates all

subsequent values

• Known as one-time passwords (OTP)

• “Will never be repeated again”

• Unique user/device identifier usually involved

• May also use current time/date to “randomly” generated code good only for a particular time interval

• Known as time-based one-time passwords (TOTP)

2FA Hacks

Page 34: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

DuplicateCode Generator

• Shared secret will always be present in at least two places (e.g.

source database/verifier and device itself)

• Attackers that learn seed/shared secret and algorithm can

generate duplicate/identical code generators that match the

victim’s code generator

Real-Life Example: Chinese APT, RSA, and Lockheed Martin

attack

2FA Hacks

Page 35: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

DuplicateCode Generator

• Shared secret will always be

present in at least two places

(e.g. source database/verifier

and device itself)

• Attackers that learn seed/shared

secret and algorithm can

generate duplicate/identical code

generators that match the

victim’s code generator

2FA Hacks

Taken from Cain & Abel hacking tool

Page 36: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Not Required/ Downgrade Attacks

• If you still have a 1FA solution for a site or service, and it can

still be used, then it’s like you don’t really have 2FA

• Many sites and services that allow 2FA, don’t require it

• Which means attacker can use non-2FA credential to access

• May allow both more secure and less secure 2FA methods,

but you likely can’t force only one method

2FA Hacks

Page 37: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Not Required/ Recovery Attacks

• ALL logon recovery methods are far less secure than 2FA

• Can bypass many 2FA requirements by answering much less

secure password reset answers

• Attackers can spoof your registered recovery phone number

and automatically be authenticate to some services/voicemail

systems

2FA Hacks

Page 38: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Social EngineerTech Support

• There have been many real-world instances where the user

had 2FA to a particular web site or service, maybe even

required that it be used;

• And hackers socially engineered tech support into disabling it

and resetting password, using other information they had

learned

2FA Hacks

Page 39: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Social EngineerTech Support

• “Hi, I lost my 2FA token or it is broken, what can I do to get a

new one?”

• “Hi, my laptop crashed and I had to reinstall Google

Authenticator. Can you resend me a new QR code to my

temporary email address so I can access my corp email?”

2FA Hacks

Page 40: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Subject Hijack

• Every 2FA token or product is uniquely tied to a subject that is supposed to be using the 2FA device/software

• If the hacker can take over the subject’s identity within the same namespace, they can reuse the stolen identity with another 2FA token/software

• And system will allow a completely unrelated 2FA token/software to authenticate and track the fake user as the real user across the system

• Examples:

• Email hijacking

• Smartcard/Active Directory hijacking

2FA Hacks

Page 41: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Subject Hijack

Example attack – Hijacking smartcard authentication

Bad guy:

1. Obtains control over Subject2’s smartcard

2. Changes target Subject1’s UPN in Active Directory (AD) to anything else

3. Change’s Subject2’s UPN in AD to Subject1’s UPN

4. Logs into AD using Subject2’s smartcard, using Subject2’s legitimate smartcard and/or PIN

5. System authenticates and tracks Subject2 as Subject1

6. Bad guy, as Subject2, performs malicious actions

7. System tracks all actions as Subject1

8. When bad guy is finished, they logout and switch UPN’s back. No one knows the difference

2FA Hacks

Page 42: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

ReuseStolen Biometrics

• If your biometric identity is stolen, how do you stop a bad guy from

re-using it?

• Once stolen, it’s compromised for your life

• You can change a password or smartcard, you can’t easily change your retina scan or fingerprint

• Known as non-repudiation attack in the crypto world

• Attacker might even steal your biometric attribute (e.g. finger/hand)

to reuse

• But more likely to steal in digital form and replay

Example: June 2015 attack stole biometrics of 21.5 million people

2FA Hacks

Page 43: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Hijacking Shared Auth

• It’s very possible for shared authentication schemes, like oAuth, to have

session tokens stolen and reused

• When you successfully authenticate to one web site that supports integrate

auth, you are essentially allowing hacker into any other web site that

supports the same integrated auth method for your identity

• So even if the next web site requires 2FA, the integrated auth will usually

seamlessly authenticate the person, bypassing the 2FA, using the previous

shared master session token

• Has been used by many APT attacks in the past

• https://www.securityweek.com/google-tightens-oauth-rules-combat-

phishing

2FA Hacks

Page 44: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Brute Force

• If the 2FA auth

screen doesn’t

include account

lockouts for x

number of bad

attempts, hackers

can brute force their

way into it

• Happens all the time

2FA Hacks

Page 45: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Buggy 2FA

• Bugs are bugs, some bypass 2FA

2FA Hacks

Page 46: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Buggy 2FA

2017 ROCA vulnerability

• Sometimes a single bug impacts hundreds of millions of

otherwise unrelated 2FA devices

• Huge bug making any 2FA product (smartcards, TPM chips,

Yubikeys, etc.) with Infineon-generated RSA key lengths of

2048 or smaller (which is most of them), easy to extract the

PRIVATE key from public key.

• Still tens to hundreds of millions of devices impacted

2FA Hacks

Page 47: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Physical Attacks

Biometric

• Fake fingerprints, fake faces, etc.

• Biometric vendors try to prevent fakes, but hackers just get

around

• Stolen and replayed

2FA Hacks

Page 48: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Physical Attacks

TPM Attacks

• Electron microscope can find private key on TPM chips

• Regular, computer cleaning canned air can be used to “freeze”

regular RAM memory chips, so that private keys can be

extracted

• Bypasses all disk encryption products

2FA Hacks

Page 49: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Defending Against 2FA Attacks

Page 50: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Test

Bloomberg 2FA1. User authenticates themselves to the Bloomberg

2FA device using fingerprint2. Logs into Bloomberg service using logon

identifier3. Bloomberg site displays a flashing square, which

is sending a “challenge code”, which is read by an optical scanner on the Bloomberg 2FA device

4. 2FA device then displays a code, which is typed into the Bloomberg service

5. If all goes well, you’re authenticated to the app

Can it be hacked?

Defending Against 2FA Attacks

Page 51: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Defenses

Social Defenses

• Realize nothing is unhackable

• Include 2FA hacking awareness into your security awareness

training

• Share this slide deck with co-workers and mgmt.

• Don’t get tricked into clicking on rogue links

• Block rogue links as much as possible

• Make sure URL is legitimate

Defending Against 2FA Attacks

Page 52: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Defenses

Technical Defenses

• Enable REQUIRED 2FA whenever possible

• Don’t use SMS-based 2FA whenever possible

• Use “1:1” 2FA solutions, which require client-side to be pre-registered with server

• Use/require 2-way, mutual, authentication whenever possible

• Ex. FIDO U2F’s Channel or Token Binding

• Does your 2FA solution specifically fight session token theft and/or malicious replays (i.e. replay resistant)

• Can your 2FA vendor’s support help be socially engineered?

• Make sure 2FA vendors use secure development lifecycle (SDL) in their programming

• Make sure 2FA has “bad attempt throttling” or “account lockout” enabled

Defending Against 2FA Attacks

Page 53: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Defenses

Technical Defenses (con’t)

• Spread factors across different “channels” or “bands” (in-band/out-band)

• Protect and audit identity attributes used by 2FA for unique identification of

2FA logons

• Don’t answer password reset questions using the honest answers.

• Encourage and use sites and services to use dynamic authentication,

where additional factors are requested for higher risk circumstances

• Understand the risks of “shared secret” systems

• For transaction-based authentication, need to send user all critical details

out-of-band before confirmation is transmitted/required

Defending Against 2FA Attacks

Page 54: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Lessons

• 2FA isn't unhackable

• 2FA does not prevent phishing or social engineering from

being successful

• 2FA is good. Everyone should use it when they can, but it

isn't unbreakable

• If you use or consider going to 2FA, security awareness

training has still got to be a big part of your overall security

defense

Key Takeaways

Page 55: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

ReadMore

• Applied Cryptography Group

• https://crypto.stanford.edu/

• Quest to Replace Passwords whitepaper

• https://www.microsoft.com/en-us/research/wp-

content/uploads/2016/02/QuestToReplacePasswords.pdf

• Joseph Bonneau

• http://jbonneau.com/

• NIST Digital Identity Guides

• https://pages.nist.gov/800-63-3/

• Check to see if a web site supports 2FA

• https://twofactorauth.org/

• FIDO Alliance

• https://fidoalliance.org/

For More Information

Page 56: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Resources

Free Phishing Security TestFind out what percentage of your users are Phish-prone

Free Domain Spoof TestFind out now if hackers can spoof an email address of your own domain.

» Learn More at «www.KnowBe4.com/Resources

19

Page 57: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Tel: 855-KNOWBE4 (566-9234) | www.KnowBe4.com | [email protected]

Questions?

Page 58: Twelve Ways to Defeat Two-Factor Authentication · 2018-10-02 · Kevin Mitnick Hack Demo 1. Kevin set up fake look-alike/sound-alike web site that was really an evil proxy 2. Tricked

Thank You!

Tel: 855-KNOWBE4 (566-9234) | www.KnowBe4.com | [email protected]

Roger A. Grimes– Data-Driven Defense Evangelist, [email protected]: @rogeragrimes