Главная
Study mode:
on
1
Intro
2
About me
3
Topics
4
Phishing Analysis
5
Problem
6
Process
7
Create Detection
8
Suricata
9
Again... Automate
10
Automatic detection
11
Putting it all together
12
Searching for phish kits
13
Considerations
14
Future state
15
Questions
Description:
Explore automated phishing analysis techniques in this conference talk from GrrCON 2019. Learn about the challenges of phishing analysis, the process of creating effective detections, and how to implement Suricata for automatic threat detection. Discover methods for searching and identifying phishing kits, consider important factors in the analysis process, and gain insights into future developments in the field. Engage with speaker Kyle Eaton as he shares his expertise and addresses audience questions on automating phishing analysis.

Automating Phishing Analysis

Add to list