__ __ __ ________ __ / // /__ _____/ /__/ ___/ _ \/ / / _ / _ `/ __/ '_/ (_ / // / /__ /_//_/\_,_/\__/_/\_\\___/____/____/ Torta Ahogada Track
Breaking Barriers: A Deep Dive into Bypassing Next-Gen 2FA and MFA Security Measures
As cyberattacks become more sophisticated, companies are increasingly relying on two-factor authentication and multi-factor authentication to protect their assets. In this presentation, we will take a deep dive into the techniques used by attackers to bypass next-generation 2FA and MFA security measures. We will demonstrate a variety of attacks used to bypass these security measures, including phishing, man-in-the-middle attacks, and SIM swapping attacks. We will also explore more advanced techniques such as exploiting vulnerabilities in authentication protocols and exploiting weaknesses in mobile authentication applications.
Muhammad Shahmeer
Founder Younite | 3rd Bug Hunter | Cyber Security Advisor PK | Top 10 Hacker MS/FB | Forbes Technology Council Member