Catching Transparent Phish - Understanding and Detecting MITM Phishing Kits

Catching Transparent Phish - Understanding and Detecting MITM Phishing Kits

OWASP Foundation via YouTube Direct link

Intro

1 of 17

1 of 17

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Catching Transparent Phish - Understanding and Detecting MITM Phishing Kits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Value of Stolen Data
  3. 3 Anatomy of a Traditional Phishing Attack
  4. 4 Limitations of Traditional Phishing
  5. 5 Man-in-the-Middle (MITM) Phishing Toolkits
  6. 6 MITM Phishing Toolkit Threat Model
  7. 7 Network-Level Phishing Detection
  8. 8 Network Timing Analysis
  9. 9 MITM Phishing Toolkit Groundtruth
  10. 10 MITM Phishing Toolkit Classifier
  11. 11 MITM Phishing Toolkits on the Web
  12. 12 MITM Phishing Domain Types
  13. 13 MITM Phishing Website Lifecycle
  14. 14 Case Study: Palo Alto Networks
  15. 15 Server-side TLS Fingerprinting
  16. 16 Countermeasures
  17. 17 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.