The remote system you are connecting to, must support the relevant 2FA 
technology (certificate, biometric signature etc.)

Connecting to a Windows file share doesn’t support 2FA.

From: [email protected] [mailto:[email protected]] On 
Behalf Of James Rankin
Sent: Tuesday, 13 January 2015 9:30 PM
To: [email protected]
Subject: [NTSysADM] 2FA scope

I've recently done some work at a place where they've seen occasional use of 
hardware keyloggers attached to USB keyboard ports to capture usernames and 
passwords.

Naturally, the first thought to mitigate against this possible threat (as 
securing the ports themselves is not feasible) is to look at implementing 
two-factor authentication. If the user's password is compromised, the lack of 
availability of the token will make the scope of the compromise much smaller.

However - I did wonder how 2FA stacks up with functions such as "Run As 
Different User"? If I steal someone's username and password, and then log on to 
a machine and do "run as different user" on Outlook.exe or even supply the 
hijacked credentials for a drive mapping to a share, will I be allowed to 
access information I otherwise wouldn't have had access to? Or does 2FA also 
come into play when authenticating via these methods as well?

I've never thought about this before, just wondering if anyone who has 
implemented 2FA knows the answer?

TIA,

Reply via email to