Linux serverNETWORK ADMINISTRATIONSsmtp server liux

DEF CON 29 – Jenko Hwong – New Phishing Attacks Exploiting OAuth Authentication Flows

OAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app by entering a code on a computer/phone. This authentication flow leads to new phishing attacks that:
– do not need server infrastructure–the login page is served by the authorization provider using their domain and cert
– do not require a client application–application identities can be reused/spoofed
– do not require user consent of application permissions

Since the phish attacks hijack oauth session tokens, MFA will be ineffective as the attacker does not need to reauthenticate. The ability to defend against these attacks is hindered by limited info and functionality to detect, mitigate, and prevent session token compromise.

I’ll demonstrate these new phishing attacks, access to sensitive user data, and lateral movement.

Defensive measures against these phishing attacks will be discussed, specifically the challenges in detection, mitigation, and prevention, and the overall lack of support for managing temporary credentials.

Open-source tools have been developed and will be used to demonstrate how users can:
– self-phish their organizations using these techniques
– audit security settings that help prevent/mitigate the attacks

1.0 Evolving Phishing Attacks
1.1 A Big Catch: Cloud Phishing from Google App Engine and Azure App Service:
1.2 Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks:

Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks

1.3 Phishing Attack Hijacks Office 365 Accounts Using OAuth Apps:
1.4 Office 365 Phishing Attack Leverages Real-Time Active Directory Validation:

Office 365 Phishing Attack Leverages Real-Time Active Directory Validation

1.5 Demonstration – Illicit Consent Grant Attack in Azure AD:
Demonstration – Illicit consent grant attack in Azure AD / Office 365
1.6 Detection and Mitigation of Illicit Consent Grant Attacks in Azure AD:
1.7 HelSec Azure AD write-up: Phishing on Steroids with Azure AD Consent Extractor: 1.8 Pawn Storm Abuses OAuth In Social Engineering Attack:

2.0 OAuth Device Code Flow
2.1 OAuth 2.0 RFC:
2.2 OAuth 2.0 for TV and Limited-Input Device Applications:
2.3 OAuth 2.0 Scopes for Google APIs:
2.2 Introducing a new phishing technique for compomising Office 365 accounts:
2.3. Office Device Code Phishing:

3.0 Additional OAuth Research Areas
3.1 Poor OAuth implementation leaves millions at risk of stolen data:
3.2 How did a full access OAuth token get issued to the Pokémon GO app?:

source by DEFCONConference

linux smtp server


My name is Allen THOMPSON. I will be posting instruction guides, how-to, troubleshooting tips and tricks on Linux, Networks telecom, hardware, security and web. My focus is to write articles that will either teach you or help you resolve a problem.

Leave a Reply