SlideShare a Scribd company logo
| ©2021 F5 NETWORKS
1
June 2021
Alexander Marcel
Credential Stuffing
“Credential Stuffing is super effective because it takes
advantage of human behavior where majority is using
same password for multiple services”
CREDENTIAL STUFFING
cre.den.tial stuff.ing
The replay of a breached username/password
pairs across sites to find accounts where
passwords have been reused.
| ©2021 F5 NETWORKS
3 Confidential / / Part of F5
Get Credentials
Automate Login
Distribute Globally
Defeat Automation Defenses (if any)
1
2
3
CREDENTIAL STUFFING
4
cre.den.tial stuff.ing
The replay of a breached username/password
pairs across sites to find accounts where
passwords have been reused.
STEPS OF CREDENTIAL STUFFING
CREDENTIAL STUFFING
Step 1
Get Credentials
CREDENTIAL STUFFING
Step 2
Automate Login
No user interaction
No device or browser
spoofing
Poor device/browser
spoofing
Excellent device/browser
spoofing
CREDENTIAL STUFFING
Step 2
Automate Login
* No programming skills required. Create script in visual constructor.
CREDENTIAL STUFFING
Step 2
Automate Login
| ©2021 F5 NETWORKS
8 Confidential / / Part of F5
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
What about 2FA ?
2FA does not stop Credential Stuffing
2FA stops automated account takeovers.
The point of credential stuffing is to find valid accounts.
Credential stuffing, even with 2FA, still results in valid accounts.
CREDENTIAL STUFFING
Step 3
Defeat Defenses (if any)
How can attacker bypass 2FA ?
1. Social Engineering
2. Phising (RTPP)
3. Sim Swapping
4. etc..
472618
CREDENTIAL STUFFING
Step 4
Distribute Globally
| ©2021 F5 NETWORKS
15
Attack Kill Chain
Stolen
credentials
Botnets,cloud
hosting,proxies
Loginbehavior
simulationtools
CAPTCHAsolving
tools
starting: $0 $2 per 1000 IPs $50 per site config $1.39 per 1000
Because resources are cheap and widely available, it can cost just $200 to takeover 1000 accounts
via credential stuffing.
CREDENTIAL STUFFING
Call To Action for
All Users
1. haveibeenpwned.com
2. Make your passwords unique
3. Use password manager
4. Enable 2FA
5. Review your social media privacy setting
and so on.. please check securitycheckli.st
CREDENTIAL STUFFING
Call To Action for
IT Security
&
Anti Fraud Team
alexander.marcel@f5.com
| ©2021 F5 NETWORKS
18
Thank You & Stay Healthy

More Related Content

PDF
State of Web Security RailsConf 2016
PPTX
The Quiet Rise of Account Takeover
PPTX
Two Step Authentication - Chris La Nauze WordPress meetup presentation
PPT
Phishing with Super Bait
PDF
Esoteric xss payloads
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PPT
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
PDF
Penetration Testing Analysis of The Shop (Test Environment)
State of Web Security RailsConf 2016
The Quiet Rise of Account Takeover
Two Step Authentication - Chris La Nauze WordPress meetup presentation
Phishing with Super Bait
Esoteric xss payloads
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Penetration Testing Analysis of The Shop (Test Environment)

What's hot (6)

PPT
DEFCON 17 Presentation: CSRF - Yeah, It Still Works
ODP
Csrf not all defenses are created equal
PPTX
Security with ColdFusion
PDF
How to get deeper administration insights into your tenant
PDF
MID_Security_Connected_Jan_van_Vliet_EN
PDF
Atelier Technique - F5 - #ACSS2019
DEFCON 17 Presentation: CSRF - Yeah, It Still Works
Csrf not all defenses are created equal
Security with ColdFusion
How to get deeper administration insights into your tenant
MID_Security_Connected_Jan_van_Vliet_EN
Atelier Technique - F5 - #ACSS2019
Ad

Similar to API Security Webinar - Credential Stuffing (6)

PDF
How Credential Stuffing is Evolving - PasswordsCon 2019
PDF
The State of Credential Stuffing and the Future of Account Takeovers.
PDF
AppSecCali - How Credential Stuffing is Evolving
PDF
Csrf
PDF
How LoginRadius Helps Media Companies Prevent Credential Cracking
PPTX
HackCon - SPF
How Credential Stuffing is Evolving - PasswordsCon 2019
The State of Credential Stuffing and the Future of Account Takeovers.
AppSecCali - How Credential Stuffing is Evolving
Csrf
How LoginRadius Helps Media Companies Prevent Credential Cracking
HackCon - SPF
Ad

More from DevOps Indonesia (20)

PDF
DevSecOps Implementation Journey
PDF
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
PDF
Securing an NGINX deployment for K8s
PDF
DevOps Indonesia Meetup #52 - announcement
PDF
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
PDF
Securing DevOps Lifecycle
PDF
DevOps Meetup 50 : Securing your Application - Announcement
PDF
Secure your Application with Google cloud armor
PDF
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
PDF
Operate Containers with AWS Copilot
PDF
Continuously Deploy Your CDK Application by Petra novandi barus
PDF
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
PDF
Securing Your Database Dynamic DB Credentials
PDF
DevOps Indonesia (online) meetup 45 - Announcement
PDF
The Death and Rise of Enterprise DevOps
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Hendra Tanto
PDF
API Security Webinar : Credential Stuffing
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
PDF
Feature Scoring in Green Field Application Development and DevOps
DevSecOps Implementation Journey
DevOps Indonesia X Palo Alto and Dkatalis Roadshow to DevOpsDays Jakarta 2022
Securing an NGINX deployment for K8s
DevOps Indonesia Meetup #52 - announcement
Dev ops meetup 51 : Securing DevOps Lifecycle - Announcement
Securing DevOps Lifecycle
DevOps Meetup 50 : Securing your Application - Announcement
Secure your Application with Google cloud armor
DevOps Meetup 49 Aws Copilot and Gitops - announcement by DevOps Indonesia
Operate Containers with AWS Copilot
Continuously Deploy Your CDK Application by Petra novandi barus
DevOps indonesia (online) meetup 46 aws with payfazz in devops indonesia - a...
Securing Your Database Dynamic DB Credentials
DevOps Indonesia (online) meetup 45 - Announcement
The Death and Rise of Enterprise DevOps
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Hendra Tanto
API Security Webinar : Credential Stuffing
API Security Webinar : Security Guidelines for Providing and Consuming APIs
Feature Scoring in Green Field Application Development and DevOps

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

API Security Webinar - Credential Stuffing

  • 1. | ©2021 F5 NETWORKS 1 June 2021 Alexander Marcel Credential Stuffing
  • 2. “Credential Stuffing is super effective because it takes advantage of human behavior where majority is using same password for multiple services” CREDENTIAL STUFFING cre.den.tial stuff.ing The replay of a breached username/password pairs across sites to find accounts where passwords have been reused.
  • 3. | ©2021 F5 NETWORKS 3 Confidential / / Part of F5 Get Credentials Automate Login Distribute Globally Defeat Automation Defenses (if any) 1 2 3 CREDENTIAL STUFFING 4 cre.den.tial stuff.ing The replay of a breached username/password pairs across sites to find accounts where passwords have been reused. STEPS OF CREDENTIAL STUFFING
  • 5. CREDENTIAL STUFFING Step 2 Automate Login No user interaction No device or browser spoofing Poor device/browser spoofing Excellent device/browser spoofing
  • 6. CREDENTIAL STUFFING Step 2 Automate Login * No programming skills required. Create script in visual constructor.
  • 8. | ©2021 F5 NETWORKS 8 Confidential / / Part of F5 CREDENTIAL STUFFING Step 3 Defeat Defenses (if any)
  • 12. CREDENTIAL STUFFING Step 3 Defeat Defenses (if any) What about 2FA ? 2FA does not stop Credential Stuffing 2FA stops automated account takeovers. The point of credential stuffing is to find valid accounts. Credential stuffing, even with 2FA, still results in valid accounts.
  • 13. CREDENTIAL STUFFING Step 3 Defeat Defenses (if any) How can attacker bypass 2FA ? 1. Social Engineering 2. Phising (RTPP) 3. Sim Swapping 4. etc.. 472618
  • 15. | ©2021 F5 NETWORKS 15 Attack Kill Chain Stolen credentials Botnets,cloud hosting,proxies Loginbehavior simulationtools CAPTCHAsolving tools starting: $0 $2 per 1000 IPs $50 per site config $1.39 per 1000 Because resources are cheap and widely available, it can cost just $200 to takeover 1000 accounts via credential stuffing.
  • 16. CREDENTIAL STUFFING Call To Action for All Users 1. haveibeenpwned.com 2. Make your passwords unique 3. Use password manager 4. Enable 2FA 5. Review your social media privacy setting and so on.. please check securitycheckli.st
  • 17. CREDENTIAL STUFFING Call To Action for IT Security & Anti Fraud Team alexander.marcel@f5.com
  • 18. | ©2021 F5 NETWORKS 18 Thank You & Stay Healthy