-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathindex.html
More file actions
98 lines (90 loc) · 4.15 KB
/
index.html
File metadata and controls
98 lines (90 loc) · 4.15 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
---
layout: default
title: Home
---
<div class="hero">
<h1>Phishing Detection Evasion Techniques</h1>
<p>A collection of phishing techniques used to evade detection.</p>
</br>
<a href="https://pushsecurity.com/blog/phishing-detection-evasion-launch/" class="btn btn-primary">Read the blog post</a>
</div>
<div class="content-card">
<h2>About this resource</h2>
<p>This database is a collection of modern phishing detection evasion techniques, breaking down the methods that
attackers are using at different stages of a phishing attack culminating in account takeover (i.e. stealing
sessions, credentials, etc.). Each stage groups the techniques observed against a phase of activity that is
designed to overcome a layer of security control — for example, the identification and blocking of malicious
URLs, or analysing pages for malicious content.
</p>
</div>
<div class="techniques-table-container" id="techniques-table">
<h2>Techniques Matrix</h2>
<p>Click on any cell in the table below to learn more about specific phishing techniques:</p>
<div class="techniques-table">
<table>
<thead>
<tr>
{% for column in site.data.techniques-table.columns %}
<th>{{ column.name }}</th>
{% endfor %}
</tr>
</thead>
<tbody>
{% comment %} Calculate the maximum number of rows needed {% endcomment %}
{% assign max_rows = 0 %}
{% for column in site.data.techniques-table.columns %}
{% if column.techniques.size > max_rows %}
{% assign max_rows = column.techniques.size %}
{% endif %}
{% endfor %}
{% comment %} Generate rows {% endcomment %}
{% for row_index in (0..max_rows) %}
{% assign has_content = false %}
{% for column in site.data.techniques-table.columns %}
{% assign technique_ref = column.techniques[row_index] %}
{% if technique_ref and technique_ref != null %}
{% assign has_content = true %}
{% break %}
{% endif %}
{% endfor %}
{% if has_content %}
<tr>
{% for column in site.data.techniques-table.columns %}
{% assign technique_ref = column.techniques[row_index] %}
{% if technique_ref and technique_ref != null %}
{% assign technique = site.techniques | where_exp: "item", "item.path contains technique_ref" |
first %}
{% if technique %}
<td class="technique-cell">
<a href="{{ technique.url | relative_url }}">{{ technique.title }}</a>
</td>
{% else %}
<td class="technique-cell">
<span class="missing-technique">{{ technique_ref }} (not found)</span>
</td>
{% endif %}
{% else %}
<td class="technique-cell empty-cell"></td>
{% endif %}
{% endfor %}
</tr>
{% endif %}
{% endfor %}
</tbody>
</table>
</div>
</div>
<div class="content-card">
<h2>Get involved</h1>
<p>This is naturally a work in progress and we plan to add and update techniques where relevant, as attacks
evolve. If you'd like to contribute, you can find the matrix <a
href="https://github.com/pushsecurity/phishing-techniques">here</a>.
</p>
</div>
<div class="content-card">
<h2>You might also like...</h1>
<p>We previously released the <a href="https://github.com/pushsecurity/saas-attacks">SaaS Attacks matrix</a>, a
MITRE-inspired resource for red and blue teams helping them to move
away from endpoint-centric thinking when it comes to running attack simulation exercises and testing
security defenses.</p>
</div>