anshikapathak12/Threat-Intelligence-Phishing-Analysis

GitHub: anshikapathak12/Threat-Intelligence-Phishing-Analysis

一个基于VirusTotal与MITRE ATT&CK的URL钓鱼威胁情报分析项目,解决如何识别与评估钓鱼网站的问题。

Stars: 0 | Forks: 0

# 威胁情报网络钓鱼分析 Threat intelligence project analyzing URLs for phishing detection using VirusTotal and MITRE ATT&CK mapping. 🔐 Threat Intelligence & Phishing Analysis 📌 Project Overview This project focuses on analyzing URLs and domains to identify phishing and malicious activity using VirusTotal. It demonstrates how security analysts investigate suspicious links and detect threats. 🛠️ Tools Used VirusTotal OSINT Techniques MITRE ATT&CK Framework 🔍 Analysis Performed ✅ 1. Safe URL Analysis URL: http://google.com Detection: 0/91 (Clean) Conclusion: Legitimate website ⚠️ 2. Suspicious URL Analysis URL: http://testphp.vulnweb.com/login.php Detection: 1/91 Observation: Mismatch in content type and unusual behavior Conclusion: Potentially suspicious 🚨 3. Phishing URL Analysis URL: http://secure-login-paypal.com Detection: 12/95 Multiple vendors flagged as phishing Conclusion: Malicious phishing website 🚨 Phishing Indicators Identified Fake domain names (brand impersonation) Use of keywords like "secure", "login" Hyphenated domain structure High detection score from security vendors 🧠 MITRE ATT&CK Mapping Technique: Phishing (T1566) 📊 Key Learnings How to analyze URLs using VirusTotal Identifying phishing websites and malicious domains Understanding threat intelligence basics Applying MITRE ATT&CK framework 🚀 Conclusion This project helped in understanding how cybersecurity analysts detect phishing attacks and investigate suspicious URLs using threat intelligence tools.
标签:AMSI绕过, Ask搜索, Cloudflare, DNS通配符暴力破解, ESC4, MITRE ATT&CK, Object Callbacks, OSINT, SEO, T1566, URL分析, VirusTotal, 假域名, 关键词识别, 品牌冒充, 域名检测, 威胁情报, 威胁检测, 开发者工具, 恶意域名, 网络安全, 网络钓鱼, 钓鱼检测, 隐私保护