Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

Preventing pass-the-hash via RDP with two-factor authentication

In researching pass-the-hash attacks, we discovered that when Microsoft implemented "Restricted Admin" mode they inadvertantly enabled pass-the-hash attacks via RDP 8.1.  This attack tool is now included in Kali Linux and probably other tools. 

Users: before you use two-factor authentication, make sure the admins do!

Dropbox is the latest internet-based service to suffer a mega-breach.  

NIST deprecates SMS as an out-of-band authentication method

When we started WiKID, we looked at using SMS to deliver one-time passcodes.  We chose not to for the simple reason that there was no way we could control the encryption and thus demonstrate the security of our solution to customers.  There wasn't any data about the possible risks or probabilities of failures (except for reliability/delivery percentages)   We looked to basic security design principles and best practices when we developed WiKID.  Could we control the encryption?  Could we generate the keys on the devices instead of using shared-secrets?  

Praetorian report on Top Attack Vectors points to two-factor auth for remote users and admins

The report from Praetorian is excellent. Download it.  Some pertinent (to us) bits:

How to add WiKID two-factor authentication to an Aruba Networks Via VPN solution

Check out this great video on how to add WiKID two-factor authentication to an HPE/Aruba Networks Via VPN:  https://www.youtube.com/watch?v=hcHXwND301U&feature=youtu.be

Recent Posts

Archive

2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom