{"guid":"ccc2f9a5-01b4-4482-bafd-fd86279a13d3","title":"Phishing for Passkeys: An Analysis of WebAuthn and CTAP","subtitle":null,"slug":"god2025-56481-phishing-for-passkeys-an-a","link":"https://c3voc.de","description":"WebAuthn was supposed to replace \n                            swords on the web: uniform, secure, manageable authentication for everyone! One of its unique selling points was supposed to be the impossibility of phishing attacks. When passkeys were introduced, some of WebAuthn's security principles were watered down in order to achieve some usability improvements and thus reach more widespread adoption.\nThis presentation discusses the security of passkeys against phishing attacks. It explains the possibilities for an attacker to gain access to accounts secured with passkeys using spear phishing, and what conditions must be met for this to happen. It also practically demonstrates such an attack and discusses countermeasures.\nParticipants will learn which WebAuthn security principles still apply to passkeys and which do not. They will learn why passkeys are no longer completely phishing-proof and how they can evaluate this consideration for their own use of passkeys.\n\nLicensed to the public under https://creativecommons.org/licenses/by-sa/4.0/","original_language":"eng","persons":["Michael Kuckuk"],"tags":["56481","2025","god2025","Track 1","god2025-eng","god2025","Day 1"],"view_count":538,"promoted":false,"date":"2025-11-26T12:20:00.000+01:00","release_date":"2025-11-26T00:00:00.000+01:00","updated_at":"2026-04-02T11:45:05.809+02:00","length":1164,"duration":1164,"thumb_url":"https://static.media.ccc.de/media/events/god/2025/56481-ccc2f9a5-01b4-4482-bafd-fd86279a13d3.jpg","poster_url":"https://static.media.ccc.de/media/events/god/2025/56481-ccc2f9a5-01b4-4482-bafd-fd86279a13d3_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/god/2025/56481-ccc2f9a5-01b4-4482-bafd-fd86279a13d3.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/god/2025/56481-ccc2f9a5-01b4-4482-bafd-fd86279a13d3.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/god2025-56481-phishing-for-passkeys-an-a","url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_title":"German OWASP Day 2025","conference_url":"https://api.media.ccc.de/public/conferences/god2025","related":[],"recordings":[{"size":11,"length":1164,"mime_type":"audio/opus","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2025-11-26T14:32:59.300+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/opus/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_opus.opus","url":"https://api.media.ccc.de/public/recordings/93563","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":119,"length":1164,"mime_type":"video/webm","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-11-26T14:43:48.578+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/webm-hd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/93569","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":38,"length":1164,"mime_type":"video/webm","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-11-26T14:41:20.100+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/webm-sd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/93568","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":39,"length":1164,"mime_type":"video/mp4","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-11-26T14:40:39.110+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/h264-sd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_sd.mp4","url":"https://api.media.ccc.de/public/recordings/93565","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":17,"length":1164,"mime_type":"audio/mpeg","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2025-11-26T14:32:55.774+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/mp3/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/93562","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"},{"size":129,"length":1164,"mime_type":"video/mp4","language":"eng","filename":"god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-11-26T13:37:54.260+01:00","recording_url":"https://cdn.media.ccc.de/events/god/2025/h264-hd/god2025-56481-eng-Phishing_for_Passkeys_An_Analysis_of_WebAuthn_and_CTAP_hd.mp4","url":"https://api.media.ccc.de/public/recordings/93534","event_url":"https://api.media.ccc.de/public/events/ccc2f9a5-01b4-4482-bafd-fd86279a13d3","conference_url":"https://api.media.ccc.de/public/conferences/god2025"}]}