
How Threat Actors Bypass Multi-Factor Authentication
The Defender's Advantage Podcast
00:00
Intro
This chapter explores adversary in the middle (AITM) attacks, focusing on their sophisticated methods for exploiting multi-factor authentication systems. It highlights the use of proxy servers to manipulate authentication processes and emphasizes the ongoing threat these attacks pose in cybersecurity.
Transcript
Play full episode