Completed
MITM Phishing Toolkit Classifier
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Catching Transparent Phish - Understanding and Detecting MITM Phishing Kits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 The Value of Stolen Data
- 3 Anatomy of a Traditional Phishing Attack
- 4 Limitations of Traditional Phishing
- 5 Man-in-the-Middle (MITM) Phishing Toolkits
- 6 MITM Phishing Toolkit Threat Model
- 7 Network-Level Phishing Detection
- 8 Network Timing Analysis
- 9 MITM Phishing Toolkit Groundtruth
- 10 MITM Phishing Toolkit Classifier
- 11 MITM Phishing Toolkits on the Web
- 12 MITM Phishing Domain Types
- 13 MITM Phishing Website Lifecycle
- 14 Case Study: Palo Alto Networks
- 15 Server-side TLS Fingerprinting
- 16 Countermeasures
- 17 Conclusion