Microsoft 365: How to Warn Users About MFA Bypass Attacks (AiTM Phishing)
Автор: Chaim Black
Загружено: 2025-05-21
Просмотров: 811
Описание:
In this video, I demonstrate how attackers can bypass MFA in Microsoft 365 using Adversary-in-the-Middle (AiTM) phishing kits. These attacks proxy Microsoft's login page to steal user credentials and session cookies in real time—even when MFA is enforced.
To help users detect and respond to these threats, I walk through a detection method that changes the background image on phishing login pages, warning users not to enter their credentials. This is achieved using an Azure Function and Microsoft Entra ID's Custom Branding feature.
What you'll learn:
How AiTM phishing attacks work (with a demo)
Why MFA alone does not stop these attacks
How to display a warning to users who go to direct-proxy AiTM phishing sites.
Limitations of this method and common evasion techniques
Practical recommendations for integrating this into a broader defense strategy
Links and Resources:
Original concept by Attic Security by Zolder:
https://zolder.io/blog/using-honeytok...
Hosted AiTM Detection from Zolder:
https://atticsecurity.com/en/aitm/
GitHub Repository referenced in video (AiTM Detector):
https://github.com/chaimblack/AiTMDet...
How to Set Up Company Branding (CustomCSS):
https://learn.microsoft.com/en-us/ent...
Clarion by Matt Kiely:
https://github.com/HuskyHacks/clarion
Original LinkedIn post from Kelvin Tegalaar:
https://www.linkedin.com/posts/kelvin...
CIPP by Kelvin Tegalaar:
https://cipp.app/
Chapters:
0:00 Introduction
1:26 How authentication works (with and without MFA)
5:04 How attackers can bypass MFA using Adversary-in-the-Middle (AiTM)
9:50 Demo using EvilGinx to bypass MFA
16:30 AiTM detector introduction
19:34 Using Custom CSS in a custom login using Company Branding
23:10 History of AiTM detector: Zolder
26:10 History of AiTM detector: Matt Kiely - Clarion
27:32 History of AiTM detector: Kelvin Tegelaar - CIPP
29:50 Open-source version of AiTM detector on GitHub
31:00 AiTM detector demo
34:05 Batman!
35:30 How effective is the AiTM detector?
35:52 Limitations of the AiTM detector
40:00 Final thoughts
Learn more about AiTM attacks: https://aitmawareness.com/
Learn more about AiTM Detectors: https://aitmawareness.com/aitm-detectors
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: