![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to educate participants on the vulnerabilities of software tokens used for two-factor authentication. By demonstrating various attack techniques, including reverse engineering OTP algorithms and extracting stored secrets, learners will understand the effectiveness of obfuscation methods used by software token vendors. The course covers classical static and dynamic analysis, custom kernel sandboxes, and full-system emulation. The intended audience includes cybersecurity professionals, ethical hackers, and individuals interested in understanding the security risks associated with software OTP generators.