LAPSUS$ Hunting with simple Anomaly Detection

Various methods to bypass OKTA MFAs have been disclosed on the internet, which I won’t discuss in this blog post. But rather how to.