You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Readme.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ This is a novel technique that leverages the well-known Device Code phishing app
5
5
It dynamically initiates the flow as soon as the victim opens the phishing link and instantly redirects them to the authentication page.
6
6
A headless browser automates this by directly entering the generated Device Code into the webpage behind the scenes.
7
7
This defeats the 10-minute token validity limitation and eliminates the need for the victim to manually perform these steps, elevating the efficiency of the attack to a new level.
8
-
What makes Device Code phishing especially dangerous is its ability to bypass FIDO’s phishing protection.
8
+
What makes Device Code phishing especially dangerous is that no authentication method, not even FIDO, is able to protect against this type of attack.
9
9
Additionally, the victim interacts with the original website they expect, making it impossible to detect the attack based on a suspicious URL.
10
10
11
11
## Demo
@@ -22,8 +22,9 @@ as soon as the victim clicks on the phishing link.
22
22
23
23
This attack technique is even more dangerous than attacker-in-the-middle (AitM) proxies, because the
24
24
user **enters their credentials on the original webpage**, making it nearly impossible to detect the phishing attempt based on a suspicious URL.
25
-
Additionally, this technique can **bypass phishing-resistant FIDO** credentials!
26
-
In some cases, the user may not even need to enter credentials if a session is already active.
25
+
Additionally, the victim might not need to authenticate interactively because a session is still active.
26
+
Therefore, the victim has almost no time to realize that this is not legitimate.
27
+
And not to forget that Device Code Flow is undermining FIDO's phishing resistance!
27
28
28
29
Currently, this tool is limited to targeting Microsoft Azure Entra users, but the underlying technique is not restricted to any specific vendor.
0 commit comments