No items found.
No items found.
No items found.

Hacking Microsoft in Real Time: Number Matching

Written By
Published On
Sep 29, 2023

Transcript

In this video, we will see how traditional 2FA fails to prevent a phishing attack. Our demo begins with our threat actor, Clara, responding to a victim, Stanley. Stanley has enabled Microsoft push notifications with number matching in an attempt to prevent a phishing attack.

Clara embeds a phishing link in her email and sends it off. Now, Clara will wait until the victim opens the email.

Stanley, working on payroll, receives a reply from Clara. He clicks the link and logs in. At this point, Microsoft will ask him to use his Authenticator application. It's a push notification asking him to select the number 14. Over on his iPad, he unlocks the screen and selects the number 14 in response to the push notification.

The webpage gets a notification that Stanley selected the right number and logs him in. However, Stanley finds no shared files since they don't exist.

As soon as Stanley opened the link, Clara began to see traffic in her phishing proxy. At this point, Clara can see some polling behavior. This is how the webpage checks with the server to see when the user has completed the push notification task.

Clara waits for a while until she sees that Stanley submitted the form and completed the login process. Once Clara sees that all authorization tokens have been intercepted, she interacts with the proxy in order to dump the session. Here, there was no password in use, so no password was captured. However, the proxy still captured the cookie that the server granted to Stanley's web browser.

Clara takes this cookie and with the help of a Chrome extension, she executes a session takeover, gaining access to Stanley's account. Now that Clara has a foothold into Stanley's account, she can act as Stanley, access his documents, and escalate her attack.

Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Hacking Microsoft in Real Time: Number Matching

Download

Transcript

In this video, we will see how traditional 2FA fails to prevent a phishing attack. Our demo begins with our threat actor, Clara, responding to a victim, Stanley. Stanley has enabled Microsoft push notifications with number matching in an attempt to prevent a phishing attack.

Clara embeds a phishing link in her email and sends it off. Now, Clara will wait until the victim opens the email.

Stanley, working on payroll, receives a reply from Clara. He clicks the link and logs in. At this point, Microsoft will ask him to use his Authenticator application. It's a push notification asking him to select the number 14. Over on his iPad, he unlocks the screen and selects the number 14 in response to the push notification.

The webpage gets a notification that Stanley selected the right number and logs him in. However, Stanley finds no shared files since they don't exist.

As soon as Stanley opened the link, Clara began to see traffic in her phishing proxy. At this point, Clara can see some polling behavior. This is how the webpage checks with the server to see when the user has completed the push notification task.

Clara waits for a while until she sees that Stanley submitted the form and completed the login process. Once Clara sees that all authorization tokens have been intercepted, she interacts with the proxy in order to dump the session. Here, there was no password in use, so no password was captured. However, the proxy still captured the cookie that the server granted to Stanley's web browser.

Clara takes this cookie and with the help of a Chrome extension, she executes a session takeover, gaining access to Stanley's account. Now that Clara has a foothold into Stanley's account, she can act as Stanley, access his documents, and escalate her attack.

Hacking Microsoft in Real Time: Number Matching

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Transcript

In this video, we will see how traditional 2FA fails to prevent a phishing attack. Our demo begins with our threat actor, Clara, responding to a victim, Stanley. Stanley has enabled Microsoft push notifications with number matching in an attempt to prevent a phishing attack.

Clara embeds a phishing link in her email and sends it off. Now, Clara will wait until the victim opens the email.

Stanley, working on payroll, receives a reply from Clara. He clicks the link and logs in. At this point, Microsoft will ask him to use his Authenticator application. It's a push notification asking him to select the number 14. Over on his iPad, he unlocks the screen and selects the number 14 in response to the push notification.

The webpage gets a notification that Stanley selected the right number and logs him in. However, Stanley finds no shared files since they don't exist.

As soon as Stanley opened the link, Clara began to see traffic in her phishing proxy. At this point, Clara can see some polling behavior. This is how the webpage checks with the server to see when the user has completed the push notification task.

Clara waits for a while until she sees that Stanley submitted the form and completed the login process. Once Clara sees that all authorization tokens have been intercepted, she interacts with the proxy in order to dump the session. Here, there was no password in use, so no password was captured. However, the proxy still captured the cookie that the server granted to Stanley's web browser.

Clara takes this cookie and with the help of a Chrome extension, she executes a session takeover, gaining access to Stanley's account. Now that Clara has a foothold into Stanley's account, she can act as Stanley, access his documents, and escalate her attack.

Hacking Microsoft in Real Time: Number Matching

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Transcript

In this video, we will see how traditional 2FA fails to prevent a phishing attack. Our demo begins with our threat actor, Clara, responding to a victim, Stanley. Stanley has enabled Microsoft push notifications with number matching in an attempt to prevent a phishing attack.

Clara embeds a phishing link in her email and sends it off. Now, Clara will wait until the victim opens the email.

Stanley, working on payroll, receives a reply from Clara. He clicks the link and logs in. At this point, Microsoft will ask him to use his Authenticator application. It's a push notification asking him to select the number 14. Over on his iPad, he unlocks the screen and selects the number 14 in response to the push notification.

The webpage gets a notification that Stanley selected the right number and logs him in. However, Stanley finds no shared files since they don't exist.

As soon as Stanley opened the link, Clara began to see traffic in her phishing proxy. At this point, Clara can see some polling behavior. This is how the webpage checks with the server to see when the user has completed the push notification task.

Clara waits for a while until she sees that Stanley submitted the form and completed the login process. Once Clara sees that all authorization tokens have been intercepted, she interacts with the proxy in order to dump the session. Here, there was no password in use, so no password was captured. However, the proxy still captured the cookie that the server granted to Stanley's web browser.

Clara takes this cookie and with the help of a Chrome extension, she executes a session takeover, gaining access to Stanley's account. Now that Clara has a foothold into Stanley's account, she can act as Stanley, access his documents, and escalate her attack.

Book

Hacking Microsoft in Real Time: Number Matching

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.