Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
Hunting AitM Phishing Infrastructure Using Certificate Transparency | Better HN
Hunting AitM Phishing Infrastructure Using Certificate Transparency
(opens in new tab)
(j027.net)
1 points
j027
3mo ago
1 comments
Share
1 comments
default
newest
oldest
j027
OP
3mo ago
OP here. My university was targeted by a recent phishing attack, and these are my findings. I hope this helps others, but this was my first experience with an Adversary in the Middle (AitM) attack.
j
/
k
navigate · click thread line to collapse