Skip to content

Latest commit

 

History

History
24 lines (17 loc) · 852 Bytes

File metadata and controls

24 lines (17 loc) · 852 Bytes

A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target.

Example #1

  1. Threat actor has a stolen username and password pair for a vulnerable website
  2. Threat actor logs in and prompted with a four digits pin code that was sent to the victims mobile
  3. Threat actor lunches brute-force against and triggers the right pin code

Impact

Vary

Risk

  • Gain unauthorized access

Redemption

  • Increase code length
  • Limit pin code submissions

ID

58a84977-90e1-4156-a555-8568e83115d0

References