2
Most read
3
Most read
4
Most read
| ©2021 F5 NETWORKS
1
June 2021
Alexander Marcel
Credential Stuffing
“Credential Stuffing is super effective because it takes
advantage of human behavior where majority is using
same password for multiple services”
CREDENTIAL STUFFING
cre.den.tial stuff.ing
The replay of a breached username/password
pairs across sites to find accounts where
passwords have been reused.
| ©2021 F5 NETWORKS
3 Confidential / / Part of F5
Get Credentials
Automate Login
Distribute Globally
Defeat Automation Defenses (if any)
1
2
3
CREDENTIAL STUFFING
4
cre.den.tial stuff.ing
The replay of a breached username/password
pairs across sites to find accounts where
passwords have been reused.
STEPS OF CREDENTIAL STUFFING
CREDENTIAL STUFFING
Step 1
Get Credentials
CREDENTIAL STUFFING
Step 2
Automate Login
No user interaction
No device or browser
spoofing
Poor device/browser
spoofing
Excellent device/browser
spoofing
CREDENTIAL STUFFING
Step 2
Automate Login
* No programming skills required. Create script in visual constructor.
CREDENTIAL STUFFING
Step 2
Automate Login
| ©2021 F5 NETWORKS
8 Confidential / / Part of F5
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
What about 2FA ?
2FA does not stop Credential Stuffing
2FA stops automated account takeovers.
The point of credential stuffing is to find valid accounts.
Credential stuffing, even with 2FA, still results in valid accounts.
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
How can attacker bypass 2FA ?
1. Social Engineering
2. Phising (RTPP)
3. Sim Swapping
4. etc..
472618
CREDENTIAL STUFFING
Step 4
Distribute Globally
| ©2021 F5 NETWORKS
15
Attack Kill Chain
Stolen
credentials
Botnets,cloud
hosting,proxies
Loginbehavior
simulationtools
CAPTCHAsolving
tools
starting: $0 $2 per 1000 IPs $50 per site config $1.39 per 1000
Because resources are cheap and widely available, it can cost just $200 to takeover 1000 accounts
via credential stuffing.
CREDENTIAL STUFFING
Call To Action for
All Users
1. haveibeenpwned.com
2. Make your passwords unique
3. Use password manager
4. Enable 2FA
5. Review your social media privacy setting
and so on.. please check securitycheckli.st
CREDENTIAL STUFFING
Call To Action for
IT Security
&
Anti Fraud Team
alexander.marcel@f5.com
| ©2021 F5 NETWORKS
18
Thank You & Stay Healthy

More Related Content

PDF
State of Web Security RailsConf 2016
PPTX
The Quiet Rise of Account Takeover
PPTX
Two Step Authentication - Chris La Nauze WordPress meetup presentation
PPT
Phishing with Super Bait
PDF
Esoteric xss payloads
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PDF
Penetration Testing Analysis of The Shop (Test Environment)
PPT
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
State of Web Security RailsConf 2016
The Quiet Rise of Account Takeover
Two Step Authentication - Chris La Nauze WordPress meetup presentation
Phishing with Super Bait
Esoteric xss payloads
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Penetration Testing Analysis of The Shop (Test Environment)
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

What's hot (6)

PPT
DEFCON 17 Presentation: CSRF - Yeah, It Still Works
ODP
Csrf not all defenses are created equal
PPTX
Security with ColdFusion
PDF
How to get deeper administration insights into your tenant
PDF
MID_Security_Connected_Jan_van_Vliet_EN
PDF
Atelier Technique - F5 - #ACSS2019
DEFCON 17 Presentation: CSRF - Yeah, It Still Works
Csrf not all defenses are created equal
Security with ColdFusion
How to get deeper administration insights into your tenant
MID_Security_Connected_Jan_van_Vliet_EN
Atelier Technique - F5 - #ACSS2019
Ad

Similar to API Security Webinar : Credential Stuffing (20)

PDF
The State of Credential Stuffing and the Future of Account Takeovers.
PPTX
How websites are attacked
PDF
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
PPTX
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
PDF
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
PDF
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
PDF
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
CIS14: Authentication: Who are You? You are What You Eat
PDF
Securely logging to Microsoft 365
PDF
How to 2FA-enable Open Source Applications
PDF
How Credential Stuffing is Evolving - PasswordsCon 2019
PDF
Leveraging the Cloud - Getting the Most Bang for your Buck ( presentation by ...
PDF
Google & FIDO Authentication
PDF
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
PDF
Automated Detection of Session Fixation Vulnerabilities
PPTX
Unlocking Security: A Comprehensive Guide to Password Vaulting
PDF
Web Application Security
PDF
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
PPTX
LIFT OFF 2017: Ransomware and IR Overview
The State of Credential Stuffing and the Future of Account Takeovers.
How websites are attacked
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
Securely logging to Microsoft 365
How to 2FA-enable Open Source Applications
How Credential Stuffing is Evolving - PasswordsCon 2019
Leveraging the Cloud - Getting the Most Bang for your Buck ( presentation by ...
Google & FIDO Authentication
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Automated Detection of Session Fixation Vulnerabilities
Unlocking Security: A Comprehensive Guide to Password Vaulting
Web Application Security
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
LIFT OFF 2017: Ransomware and IR Overview
Ad

More from DevOps Indonesia (20)

PDF
DevSecOps Implementation Journey
PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
PDF
Securing an NGINX deployment for K8s
PDF
DevOps Indonesia Meetup #52 - announcement
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
PDF
Securing DevOps Lifecycle
PDF
DevOps Meetup 50 : Securing your Application - Announcement
PDF
Secure your Application with Google cloud armor
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
PDF
Operate Containers with AWS Copilot
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
PDF
Securing Your Database Dynamic DB Credentials
PDF
DevOps Indonesia (online) meetup 45 - Announcement
PDF
The Death and Rise of Enterprise DevOps
PDF
API Security Webinar - Credential Stuffing
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Hendra Tanto
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
PDF
Feature Scoring in Green Field Application Development and DevOps
DevSecOps Implementation Journey
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
Securing an NGINX deployment for K8s
DevOps Indonesia Meetup #52 - announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Securing DevOps Lifecycle
DevOps Meetup 50 : Securing your Application - Announcement
Secure your Application with Google cloud armor
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
Operate Containers with AWS Copilot
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
Securing Your Database Dynamic DB Credentials
DevOps Indonesia (online) meetup 45 - Announcement
The Death and Rise of Enterprise DevOps
API Security Webinar - Credential Stuffing
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Hendra Tanto
API Security Webinar : Security Guidelines for Providing and Consuming APIs
Feature Scoring in Green Field Application Development and DevOps

Recently uploaded (20)

PPTX
Continents English presentation 2025.pptx
PDF
canadatourpackages 10nights 11 days tour
PDF
Raja Ampat: Fishopcalpse in the Last Paradise - PUBLISHED with DYK.net & DYK....
PPTX
On Safari in India in Search of the Bengal Tiger
PPTX
Darjeelingallknowledgeableitemofsik.pptx
PDF
Dining Etiquette & Service Excellence Training part 2
PDF
Giants of Betel Nut Island - KohMak - PUBLISHED with EZdive
DOCX
Everest Base Camp Trek in October: A Complete Guide
PDF
How Technology is Changing Transportation Services in India.pdf
PPTX
Discover Brazil Your Ultimate Tour Package.pptx
PDF
Best Traveling sites for Each types of Tours
PPTX
Mohammed Osman Ali Agricolus Presentation.ppt
PDF
10 Common Mistakes to Avoid in Kumbh Tent Booking.pdf
PDF
Planning Your First Kumbh Yatra? Here’s What You Need
PDF
Attractions Management - Guest Services, Facility and Support Services.pdf
PPTX
Manuel Antonio National Park – Explore with Mapache Tours
PDF
List of the World’s Highest Peak - Mount Everest
PDF
Bostons Best Unforgettable Attractions for Adults
PPTX
sikkim.alalallsnndndnxnxnxnxndndjjdjjdpptx
PPTX
Smart Travel Solutions Delhi Airport to Chandigarh Taxi Service.pptx
Continents English presentation 2025.pptx
canadatourpackages 10nights 11 days tour
Raja Ampat: Fishopcalpse in the Last Paradise - PUBLISHED with DYK.net & DYK....
On Safari in India in Search of the Bengal Tiger
Darjeelingallknowledgeableitemofsik.pptx
Dining Etiquette & Service Excellence Training part 2
Giants of Betel Nut Island - KohMak - PUBLISHED with EZdive
Everest Base Camp Trek in October: A Complete Guide
How Technology is Changing Transportation Services in India.pdf
Discover Brazil Your Ultimate Tour Package.pptx
Best Traveling sites for Each types of Tours
Mohammed Osman Ali Agricolus Presentation.ppt
10 Common Mistakes to Avoid in Kumbh Tent Booking.pdf
Planning Your First Kumbh Yatra? Here’s What You Need
Attractions Management - Guest Services, Facility and Support Services.pdf
Manuel Antonio National Park – Explore with Mapache Tours
List of the World’s Highest Peak - Mount Everest
Bostons Best Unforgettable Attractions for Adults
sikkim.alalallsnndndnxnxnxnxndndjjdjjdpptx
Smart Travel Solutions Delhi Airport to Chandigarh Taxi Service.pptx

API Security Webinar : Credential Stuffing

  • 1. | ©2021 F5 NETWORKS 1 June 2021 Alexander Marcel Credential Stuffing
  • 2. “Credential Stuffing is super effective because it takes advantage of human behavior where majority is using same password for multiple services” CREDENTIAL STUFFING cre.den.tial stuff.ing The replay of a breached username/password pairs across sites to find accounts where passwords have been reused.
  • 3. | ©2021 F5 NETWORKS 3 Confidential / / Part of F5 Get Credentials Automate Login Distribute Globally Defeat Automation Defenses (if any) 1 2 3 CREDENTIAL STUFFING 4 cre.den.tial stuff.ing The replay of a breached username/password pairs across sites to find accounts where passwords have been reused. STEPS OF CREDENTIAL STUFFING
  • 5. CREDENTIAL STUFFING Step 2 Automate Login No user interaction No device or browser spoofing Poor device/browser spoofing Excellent device/browser spoofing
  • 6. CREDENTIAL STUFFING Step 2 Automate Login * No programming skills required. Create script in visual constructor.
  • 8. | ©2021 F5 NETWORKS 8 Confidential / / Part of F5 CREDENTIAL STUFFING Step 3 Defeat Defenses (if any)
  • 12. CREDENTIAL STUFFING Step 3 Defeat Defenses (if any) What about 2FA ? 2FA does not stop Credential Stuffing 2FA stops automated account takeovers. The point of credential stuffing is to find valid accounts. Credential stuffing, even with 2FA, still results in valid accounts.
  • 13. CREDENTIAL STUFFING Step 3 Defeat Defenses (if any) How can attacker bypass 2FA ? 1. Social Engineering 2. Phising (RTPP) 3. Sim Swapping 4. etc.. 472618
  • 15. | ©2021 F5 NETWORKS 15 Attack Kill Chain Stolen credentials Botnets,cloud hosting,proxies Loginbehavior simulationtools CAPTCHAsolving tools starting: $0 $2 per 1000 IPs $50 per site config $1.39 per 1000 Because resources are cheap and widely available, it can cost just $200 to takeover 1000 accounts via credential stuffing.
  • 16. CREDENTIAL STUFFING Call To Action for All Users 1. haveibeenpwned.com 2. Make your passwords unique 3. Use password manager 4. Enable 2FA 5. Review your social media privacy setting and so on.. please check securitycheckli.st
  • 17. CREDENTIAL STUFFING Call To Action for IT Security & Anti Fraud Team [email protected]
  • 18. | ©2021 F5 NETWORKS 18 Thank You & Stay Healthy