anshikapathak12/Threat-Intelligence-Phishing-Analysis
GitHub: anshikapathak12/Threat-Intelligence-Phishing-Analysis
一个基于VirusTotal与MITRE ATT&CK的URL钓鱼威胁情报分析项目,解决如何识别与评估钓鱼网站的问题。
Stars: 0 | Forks: 0
# 威胁情报网络钓鱼分析
Threat intelligence project analyzing URLs for phishing detection using VirusTotal and MITRE ATT&CK mapping.
🔐 Threat Intelligence & Phishing Analysis
📌 Project Overview
This project focuses on analyzing URLs and domains to identify phishing and malicious activity using VirusTotal. It demonstrates how security analysts investigate suspicious links and detect threats.
🛠️ Tools Used
VirusTotal
OSINT Techniques
MITRE ATT&CK Framework
🔍 Analysis Performed
✅ 1. Safe URL Analysis
URL: http://google.com
Detection: 0/91 (Clean)
Conclusion: Legitimate website
⚠️ 2. Suspicious URL Analysis
URL: http://testphp.vulnweb.com/login.php
Detection: 1/91
Observation: Mismatch in content type and unusual behavior
Conclusion: Potentially suspicious
🚨 3. Phishing URL Analysis
URL: http://secure-login-paypal.com
Detection: 12/95
Multiple vendors flagged as phishing
Conclusion: Malicious phishing website
🚨 Phishing Indicators Identified
Fake domain names (brand impersonation)
Use of keywords like "secure", "login"
Hyphenated domain structure
High detection score from security vendors
🧠 MITRE ATT&CK Mapping
Technique: Phishing (T1566)
📊 Key Learnings
How to analyze URLs using VirusTotal
Identifying phishing websites and malicious domains
Understanding threat intelligence basics
Applying MITRE ATT&CK framework
🚀 Conclusion
This project helped in understanding how cybersecurity analysts detect phishing attacks and investigate suspicious URLs using threat intelligence tools.
标签:AMSI绕过, Ask搜索, Cloudflare, DNS通配符暴力破解, ESC4, MITRE ATT&CK, Object Callbacks, OSINT, SEO, T1566, URL分析, VirusTotal, 假域名, 关键词识别, 品牌冒充, 域名检测, 威胁情报, 威胁检测, 开发者工具, 恶意域名, 网络安全, 网络钓鱼, 钓鱼检测, 隐私保护