OWASP 2FA Social Engineering
OWASP 2FA Social Engineering
www.owasp.org
www.owasp.org
www.owasp.org
5. Security misconfiguration
10. Unvalidated redirects and forwards
9. Using components with known OWASP
vulnerabilities
8. Cross site request forgery (XSRF)
7. Missing function level access control
6. Sensitive data exposure
5. Security misconfiguration
1. Injection (SQLi)
OWASP
1. Injection (SQLi)
2. Broken authentication and session management
3. Cross Site Scripting (XSS)
4. Direct object Reference
5. Security misconfiguration
6. Sensitive data exposure
7. Missing function level access control
8. Cross site request forgery (XSRF)
9. Using components with known vulnerabilities
10. Unvalidated redirects and forwards
OWASP
Multi-factor authentication is a
strong defense against online
identity theft and fraud
2 FACTOR AUTHENTICATION
Multi-factor authentication is a
strong defense against online
identity theft and fraud
Phishing
Baiting
Clickjacking
SOCIAL ENGINEERING
Phishing
Phishing is an attempt to get
sensitive information from users
by masquerading as a trust worthy
entity
A bank, school, a friend
Clickjacking Baiting
SOCIAL ENGINEERING
Phishing
You might receive an email from
your mail provider asking you to
mail your password to them
Clickjacking Baiting
SOCIAL ENGINEERING
Phishing
When phishing uses your personal
information it’s infinitely more
successful
Clickjacking Baiting
SOCIAL ENGINEERING
Phishing
Clickjacking Baiting
SOCIAL ENGINEERING
Phishing
Clone phishing is when the mail mimics a
legitimate mail which was sent earlier
Clickjacking Phishing
SOCIAL ENGINEERING
Clickjacking
This is a technique to get the user to
click on something which is
different from what the user
perceives he is clicking on
Baiting Phishing
SOCIAL ENGINEERING
Clickjacking
Baiting Phishing
SOCIAL ENGINEERING
Clickjacking
Baiting Phishing
SOCIAL ENGINEERING
Clickjacking
Baiting Phishing
SOCIAL ENGINEERING
Clickjacking
A user clicks on a concealed link
(matches with the page background)
Baiting Phishing
A user clicks on a concealed link
SOCIAL ENGINEERING
(matches with the page background)
Clickjacking
Another page is loaded in a transparent
layer over the existing page
Clickjacking
A user clicks on a concealed link
(matches with the page background)