Overview
Explore a Black Hat conference talk on DeepPhish, a system simulating malicious AI for phishing attacks. Learn about the use of encryption by cybercriminals to hide messages and execute successful malware and phishing campaigns while evading detection. Dive into topics like Recurrent Neural Networks, web certificates, long name hunting, and data analysis. Understand the algorithm's functionality, effectiveness, and real-world implications. Examine phishing certificates, redirects, and potential countermeasures. Gain insights into the ongoing battle against sophisticated AI-driven phishing attempts and the challenges faced by cybersecurity professionals.
Syllabus
Introduction
Recurrent Neural Network
Web Certificate
Long Name Hunting
Research Project
Data Analysis
Algorithm Summary
How to use Algorithm
Effectiveness of Algorithm
Results
Attacks are real
Phishing certificates
Redirects
Next paper
Would I be able to render your service inefficient
Does your algorithm update its web certificates
Did you try to fish against stats
Taught by
Black Hat