Let’s do a magic trick. Take one proxy server, make it fulfill requests through a browser’s communication API. Inject said proxy server into a target’s browser. What happens, you ask? Through this proxy, you transparently inherit your target’s identity on the web and can surf to sites they’ve already authenticated to. Browser Pivoting is a man-in-the-browser attack that gets past two-factor user authentication and other protection measures. This talk will demonstrate browser pivoting, discuss how it works, and speak to how an attacker can inherit identity… when they know the right place to hook in.