The kit deploys a evilginx-style reverse proxy to seize and exploit traffic between targets and legitimate authentication services (such as Gmail, Yahoo and Microsoft) and acts as a man-in-the-middle to capture tokens, credentials, and session cookies. Since Astaroth can intercept authentication data in real-time, many traditional phishing defense measures are ineffective.
Educational Webinars, Videos & Podcasts: Receive cutting-edge insights and invaluable resources, empowering you to stay ahead in the dynamic world of security.
Empowering Content: At your computer or on-the-go, stay up-to-date when you receive our eNewsletters curated with the latest technology and services that address physical, logical, cyber and enterprise resilience.
Unlimited Article Access: Dive deep into the world of cybersecurity and risk management leadership with unlimited access to our library of online articles.