Phoca
Tool to analyze and detect MITM phishing toolkits on the web.
Install / Use
/learn @catching-transparent-phish/PhocaREADME
PHOCA
Tool to analyze and classify websites as originating from a MITM phishing toolkit or not. Supplementary material for CCS '21 paper "Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits".
Citation:
@article{kondracki2021catching,
title={Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits},
author={Kondracki, Brian and Azad, Babak Amin and Starov, Oleksii and Nikiforakis, Nick},
booktitle={ACM Conference on Computer and Communications Security (CCS)},
year={2021}
}
Requirements
- python3.7
Installation
Install Python dependencies using python3.7 -m pip install -r requirements.txt
Usage
To access low-level network functions to create and send raw TCP packets, this tool requires sudo privilages.
Scan one website by specifying the domain or URL of the site:
sudo ./phoca www.google.com
Bulk scan multiple websites by supplying a csv containing one URL or domain per line:
sudo ./phoca -r domains.csv
Output results to a CSV file rather than terminal output:
sudo ./phoca -r domains.csv -w results.csv
JSON and CSV formats supported for output of raw feature data:
sudo ./phoca --raw-data --output-format json www.google.com | jq
{
"www.google.com": {
"classification": "Non-Phishing",
"data": {
"site": "www.google.com",
"tcpSYNTiming": 5.626678466796875e-05,
"tlsClientHelloTiming": 0.0029659271240234375,
"tlsClientHelloErrorTiming": 0.003025054931640625,
"tlsHandshakeTiming": 0.012071371078491211,
...
Docker
Alternatively, you can use the supplied Docker image to run PHOCA from a Docker container, simplifying the setup process. To do this, first build the image:
sudo docker build -t phoca .
Then, run the container, supplying the domain of interest:
sudo docker run --rm phoca www.attacker.com
If you would like to allow PHOCA to read domains from an input file, you must mount that file to the root of the container:
sudo docker run -v /home/user/input.txt:/input.txt phoca -r input.txt
Related Skills
node-connect
344.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
99.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
344.4kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
344.4kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
