Skip to content

Commit

Permalink
added MFA blog
Browse files Browse the repository at this point in the history
  • Loading branch information
sivolko committed Jan 4, 2025
1 parent bc1124c commit 564c63b
Show file tree
Hide file tree
Showing 64 changed files with 1,340 additions and 388 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
---
layout: post
title: The Best Way to Fool Yourself:Use SMS 2FA
subtitle: Is your 2FA reliable?
description: Let's get concept clear what's Log analytics and log analytics workspace
image: https://res.cloudinary.com/hugs4bugs/image/upload/v1735990558/hugs4bugs/MFA/profile_u7ic2x.jpg
optimized_image: https://res.cloudinary.com/hugs4bugs/image/upload/v1735990558/hugs4bugs/MFA/profile_u7ic2x.jpg
author: Shubhendu Shubham
date: 2025-01-04 00:00:00 Z
category: Identity & Access
tags:
- Cyber Security
---

Okay in this blog I'm not gonna tell you about sim swapping or OTP bypassing or hijacking, I'll try to keep as realistic I can for all layman people. Before we jump into our main topic let's clear a few terms like MFA == Multifactor Authenticator , 2FA == Two Factor Authenticator.

Now let's understand the problem statement with example of a person name called "Sivolko". Meet sivolko, a software developer who relies heavily on various online accounts for both work and personal use. Sivolko is well aware of securing these accounts and has enabled Multifactor Authenticator (MFA) on all of them.Unlikely many common people, sivolko uses SMS-based MFA especially for Email and he often uses Gmail as primary email and another gmail as backup but he haven't logged in to his backup gmail account since couple of months.

However Sivolko is about to discover that this method,while seemingly secure can lead to some significant complications. Let's breakdown complications :-

**The Problem with SMS-Based MFA**

One day sivolko loses his smartphone while communiting to work.Panic sets in as sivolko realises that without the smartphone, he can't receive OTPs needed to access their accounts. so what could be common issues for him ? Let's break down them as well

1. **Lost Phone or SIM Card** : Without smartphone sivolko can't receive the OTP via SMS. Usually gmail sends 6 or 7 numeric OTP which starts with "G". So what he'll try , use another method to authenticate option given by Gmail. Now he is supposed to enter his backup email address, which he remembers now it asks to enter password for the back email address as well, Here comes the twist since it was his backup email address he was not using it frequently so obvious reason he don't remember . Now when he tries to reset password for his backup email it sends OTP to his phone which is already lost ?

2. **Forgotten Backup Email Password**: Sivolko tries to use the backup email for account recovery but realizes they haven't accessed it in months and have forgotten the password. This creates a frustrating loop where Sivolko can't access the OTP sent to the backup email.

3. **Circular Problem**: With both the primary and backup methods failing, Sivolko is stuck in a loop where they can't access their accounts. This defeats the purpose of MFA, which is supposed to make accounts more secure, not more complicated.


*Before jumping to advance solution for this situation let's understand what could be better here, Sivolko might have used different SIM or phone numbers for both primary and backup emails. Another both numbers should not be in same phone or device, incase of lost still another phone or SIM could be easily accessible. Another point is he could have allowed sync in option in all devices where he still get option to "tap to verify" on another logged in devices with same primary or secondary email.*

So let's see the standard Industrial grade solutions.

**Use FIDO Keys or Authenticator Apps?**

Sivolko starts researching alternative MFA methods and discovers FIDO (Fast Identity Online) keys and authenticator apps. Here's why these might be better options:

1. **FIDO Keys**: These are physical devices that Shubham can plug into their computer or connect via Bluetooth. They provide a secure way to authenticate without relying on SMS or email. FIDO keys use public key cryptography to verify identity, meaning that even if someone steals Sivolko's password, they won't be able to access the account without the physical key.

2. **Authenticator Apps**: Apps like Google Authenticator or Microsoft Authenticator app which generate OTPs on Sivolo's phone without needing a cellular connection. Even if Sivolko loses their phone, they can often restore accounts on a new device using backup codes. Authenticator apps are more secure than SMS-based MFA because they don't rely on a phone number, which can be easily spoofed or intercepted.

**Final Verdict**
Sivolko decides to implement some practical solutions to avoid future complications:

1. **Use Authenticator Apps**: Sivolko sets up an authenticator app on their phone and saves the backup codes provided during setup. These codes can be used to restore access if the phone is lost. Authenticator apps are easy to use and provide a higher level of security than SMS-based MFA.

2. **Backup Email**: Sivolko regularly checks and updates their backup email, ensuring they remember the password or have a secure way to recover it. Sivolko also uses a different email provider for the backup email to reduce the risk of both accounts being compromised at the same time.

3. **FIDO Keys**: Sivolko invests in a FIDO key for an extra layer of security. These keys are highly secure and can be used across multiple devices. FIDO keys are especially useful for securing high-value accounts, such as email or bank accounts.

4. **Multiple Recovery Options**: Sivolko uses a combination of recovery options. For example, they set up both an authenticator app and a FIDO key. This way, if one method fails, there's a backup. Sivolko also sets up recovery options for the recovery options, such as a backup phone number or email address.

Lemme know if you have been in situtation like sivolko or do you have other solutions to deal with it.
18 changes: 9 additions & 9 deletions _site/2021-08-2-Understanding-basics-of-security/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -346,29 +346,29 @@ <h2>See also</h2>


<li>
<a href="/access-management-101/">
<a href="/difference-between-WAF-and-IPS/">

<img src="https://d3nn873nee648n.cloudfront.net/900x600/16347/120-SM692126.jpg">
<img src="https://images.pexels.com/photos/5473298/pexels-photo-5473298.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">

<h3>Access Management 101.</h3>
<h3>WAF vs IPS</h3>
</a>
</li>

<li>
<a href="/why-new-session-should-be-created-during-user-authentication/">
<a href="/azure-networking-101/">

<img src="https://cdn.pixabay.com/photo/2019/04/29/09/33/anonymous-4165613_1280.jpg">
<img src="https://th.bing.com/th/id/Rb3e6202f5356edebd8c8205623eef0f1?rik=2tDqbcLpDFguLg&riu=http%3a%2f%2fwww.shadowandy.net%2fwp%2fwp-content%2fuploads%2fdocker.png&ehk=d2o4OLvE5SZOjrajjCgOCdzXQ9xmehUy6vTEhPPFi3c%3d&risl=&pid=ImgRaw">

<h3>Why new session should be created during user authentication?</h3>
<h3>Azure Networking 101</h3>
</a>
</li>

<li>
<a href="/tools-that-SOC-security-analys-should-know/">
<a href="/Automation-with-Jenkins-and-Github/">

<img src="https://images.pexels.com/photos/60504/security-protection-anti-virus-software-60504.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">
<img src="https://miro.medium.com/max/700/1*QTmgOmxLr78Ty_evSD_Riw.gif">

<h3>Tools that SOC/Security Analyst must know</h3>
<h3>Automation with Jenkins and GitHub</h3>
</a>
</li>

Expand Down
18 changes: 9 additions & 9 deletions _site/Automation-with-Jenkins-and-Github/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -479,29 +479,29 @@ <h2>See also</h2>


<li>
<a href="/send-email-with-Azure-logic-app/">
<a href="/waf-vs-firewall/">

<img src="https://d3nn873nee648n.cloudfront.net/900x600/19765/300-SM960337.jpg">
<img src="https://images.pexels.com/photos/1714208/pexels-photo-1714208.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">

<h3>Automate Email with Azure Logic App</h3>
<h3>WAF vs Firewall</h3>
</a>
</li>

<li>
<a href="/useful-cybersecurity-search-engines/">
<a href="/streamline-security-wazuh-in-docker/">

<img src="https://cdn.pixabay.com/photo/2018/04/22/22/57/hacker-3342696_960_720.jpg">
<img src="https://plus.unsplash.com/premium_photo-1683140655656-20448abc55da?q=80&w=1470&auto=format&fit=crop&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D">

<h3>Search engines one should know as a CyberSecurity enthausist!</h3>
<h3>Streamline Security :Wazuh in Docker with Kali</h3>
</a>
</li>

<li>
<a href="/access-management-101/">
<a href="/what-is-difference-between-ls-and-ls-lrt-command/">

<img src="https://d3nn873nee648n.cloudfront.net/900x600/16347/120-SM692126.jpg">
<img src="https://images.pexels.com/photos/4709289/pexels-photo-4709289.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">

<h3>Access Management 101.</h3>
<h3>Do you use ls -lrt?</h3>
</a>
</li>

Expand Down
18 changes: 9 additions & 9 deletions _site/Docker-101/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -625,29 +625,29 @@ <h2>See also</h2>


<li>
<a href="/storing-and-managing-secrets-using-azure-vault/">
<a href="/streamline-security-wazuh-in-docker/">

<img src="https://images.unsplash.com/photo-1550439062-609e1531270e?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=800&q=80">
<img src="https://plus.unsplash.com/premium_photo-1683140655656-20448abc55da?q=80&w=1470&auto=format&fit=crop&ixlib=rb-4.0.3&ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D">

<h3>Managing and Storing Secrets:Azure Vault.🙆</h3>
<h3>Streamline Security :Wazuh in Docker with Kali</h3>
</a>
</li>

<li>
<a href="/Progressive-web-app/">
<a href="/Fundamentals-of-Network-security/">

<img src="https://images.unsplash.com/photo-1522071820081-009f0129c71c?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=870&q=80">
<img src="https://images.unsplash.com/photo-1563986768609-322da13575f3?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=750&q=80">

<h3>Progressive WebApp.</h3>
<h3>Fundamentals of Network Security.☠️</h3>
</a>
</li>

<li>
<a href="/difference-between-WAF-and-IPS/">
<a href="/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/">

<img src="https://images.pexels.com/photos/5473298/pexels-photo-5473298.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">
<img src="https://res.cloudinary.com/hugs4bugs/image/upload/v1735797428/hugs4bugs/IMG20240824121111_d2qqef.jpg">

<h3>WAF vs IPS</h3>
<h3>Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel</h3>
</a>
</li>

Expand Down
12 changes: 6 additions & 6 deletions _site/Fundamentals-of-Network-security/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -485,11 +485,11 @@ <h2>See also</h2>


<li>
<a href="/Progressive-web-app/">
<a href="/what-is-chat-gpt/">

<img src="https://images.unsplash.com/photo-1522071820081-009f0129c71c?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=870&q=80">
<img src="https://images.pexels.com/photos/7108/notebook-computer-chill-relax.jpg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">

<h3>Progressive WebApp.</h3>
<h3>What is chatGpt? How to use it?</h3>
</a>
</li>

Expand All @@ -503,11 +503,11 @@ <h3>Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel</h3>
</li>

<li>
<a href="/access-management-101/">
<a href="/the-blue-team-protecting-you/">

<img src="https://d3nn873nee648n.cloudfront.net/900x600/16347/120-SM692126.jpg">
<img src="https://cdn.pixabay.com/photo/2017/11/19/23/56/hacking-2964100_960_720.jpg">

<h3>Access Management 101.</h3>
<h3>The Blue Team.☠️</h3>
</a>
</li>

Expand Down
18 changes: 9 additions & 9 deletions _site/How-to-install-Jenkins-on-Linux/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -433,29 +433,29 @@ <h2>See also</h2>


<li>
<a href="/how-to-manage-azure-active-directory-objects/">
<a href="/Fundamentals-of-Network-security/">

<img src="https://images.pexels.com/photos/7238759/pexels-photo-7238759.jpeg?auto=compress&cs=tinysrgb&w=1260&h=750&dpr=1">
<img src="https://images.unsplash.com/photo-1563986768609-322da13575f3?ixlib=rb-1.2.1&ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&auto=format&fit=crop&w=750&q=80">

<h3>How to create & Manage users and Groups within Azure AD.</h3>
<h3>Fundamentals of Network Security.☠️</h3>
</a>
</li>

<li>
<a href="/Progressive-webapps-on-azure/">
<a href="/how-to-like-instagram-post-with-javascript/">

<img src="https://th.bing.com/th/id/R.49bd0ccbb9e904407116b65ce6a50d41?rik=1KXzdiLejsH2eA&riu=http%3a%2f%2fclipground.com%2fimages%2fcoder-clipart-1.jpg&ehk=xl5oxtd6bHoDW1%2f3HB007zg97209vFB75YXyIskHtPg%3d&risl=&pid=ImgRaw&r=0">
<img src="https://media.giphy.com/media/cmqnzFK17DO4vKCscd/giphy.gif">

<h3>Building and Deploying PWA on Azure Cloud.</h3>
<h3>How to like Instagram posts with JavaScript?</h3>
</a>
</li>

<li>
<a href="/How-to-install-threatmapper-in-kali-linux/">
<a href="/access-management-101/">

<img src="https://assets-global.website-files.com/63eaa07bbe370228bab003ea/644292bf096fd43dfd6532d4_image2-p-800.png">
<img src="https://d3nn873nee648n.cloudfront.net/900x600/16347/120-SM692126.jpg">

<h3>How to install ThreatMapper in Kali Linux?</h3>
<h3>Access Management 101.</h3>
</a>
</li>

Expand Down
Loading

0 comments on commit 564c63b

Please sign in to comment.