Session

BitB: How 2FA Can Be Phished Without Domain Spoofing

Browser-in-the-Browser (BitB) attacks are an evolution of phishing techniques that use realistic fake browser windows to harvest credentials and second-factor codes in real time. Unlike traditional phishing, BitB doesn’t redirect the user away from the legitimate domain; instead it simulates a login popup inside the browser page, making detection by users and some security controls more difficult. This presentation will demystify the mechanics, demonstrate a practical keep-simple proof of concept, and present actionable defenses.

Matko Antun Bekavac

Security Consultant

Velika Gorica, Croatia

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top