Главная
Study mode:
on
1
Introduction
2
Recurrent Neural Network
3
Web Certificate
4
Long Name Hunting
5
Research Project
6
Data Analysis
7
Algorithm Summary
8
How to use Algorithm
9
Effectiveness of Algorithm
10
Results
11
Attacks are real
12
Phishing certificates
13
Redirects
14
Next paper
15
Would I be able to render your service inefficient
16
Does your algorithm update its web certificates
17
Did you try to fish against stats
Description:
Explore a Black Hat conference talk on DeepPhish, a system simulating malicious AI for phishing attacks. Learn about the use of encryption by cybercriminals to hide messages and execute successful malware and phishing campaigns while evading detection. Dive into topics like Recurrent Neural Networks, web certificates, long name hunting, and data analysis. Understand the algorithm's functionality, effectiveness, and real-world implications. Examine phishing certificates, redirects, and potential countermeasures. Gain insights into the ongoing battle against sophisticated AI-driven phishing attempts and the challenges faced by cybersecurity professionals.

DeepPhish - Simulating Malicious AI

Black Hat
Add to list