@khlr

2 Followers
56 Following
3 Posts
Hi there – I’m Jan, software developer focusing on authentication, federation, and identity protocols.
I’m one of the contributors to SAML-tracer.
Glad to be in a space where federation isn't just a buzzword.

Just read a great blog post by @dennis_kniep about a novel Device Code #phishing technique that can bypass even #FIDO 😱

The attack dynamically starts the #OAuth flow when the victims click a link, uses a headless browsers to automate code entry - eliminating the usual 10-minute window.
Even worse: Victims authenticate on the real website, so there's no suspicious URL to tip them off.

Great technical write-up with PoC included šŸ‘

https://denniskniep.github.io/posts/09-device-code-phishing/

#cybersecurity #infosec #entra

Phishing despite FIDO, leveraging a novel technique based on the Device Code Flow

TL;DR; This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow as soon as the victim opens the phishing link and instantly redirects them to the authentication page. A headless browser automates this by directly entering the generated Device Code into the webpage behind the scenes. This defeats the 10-minute token validity limitation and eliminates the need for the victim to manually perform these steps, elevating the efficiency of the attack to a new level.

A few days ago, we released SAML-tracer v1.9 šŸš€

Besides some minor fixes, this version introduces a new feature:
You can now filter for protocol-related requests only – cutting out the noise from all those extra requests that get in the way during analysis.

Get it here:
Firefox: https://addons.mozilla.org/firefox/addon/saml-tracer/
Chrome: https://chromewebstore.google.com/detail/saml-tracer/mpdajninpobndbfcldcmbpnnbhibjmch

#saml #samltracer #sso #singlesignon