Главная
Study mode:
on
1
Intro
2
The Value of Stolen Data
3
Anatomy of a Traditional Phishing Attack
4
Limitations of Traditional Phishing
5
Man-in-the-Middle (MITM) Phishing Toolkits
6
MITM Phishing Toolkit Threat Model
7
Network-Level Phishing Detection
8
Network Timing Analysis
9
MITM Phishing Toolkit Groundtruth
10
MITM Phishing Toolkit Classifier
11
MITM Phishing Toolkits on the Web
12
MITM Phishing Domain Types
13
MITM Phishing Website Lifecycle
14
Case Study: Palo Alto Networks
15
Server-side TLS Fingerprinting
16
Countermeasures
17
Conclusion
Description:
Explore the evolving landscape of phishing attacks and defense mechanisms in this 58-minute conference talk. Delve into the anatomy of traditional phishing techniques and their limitations before examining the rise of Man-in-the-Middle (MITM) phishing toolkits. Analyze the threat model of MITM phishing and learn about network-level detection methods, including network timing analysis. Gain insights into MITM phishing toolkit classification, their prevalence on the web, and domain types commonly used. Investigate the lifecycle of MITM phishing websites through a case study of Palo Alto Networks. Discover server-side TLS fingerprinting techniques and explore effective countermeasures to protect against these sophisticated attacks. Conclude with a comprehensive understanding of the challenges and strategies in detecting and mitigating transparent phishing attempts.

Catching Transparent Phish - Understanding and Detecting MITM Phishing Kits

OWASP Foundation
Add to list
0:00 / 0:00