This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Phishycat Project

From OWASP
Jump to: navigation, search
OWASP Project Header.jpg

OWASP Phishycat Project

OWASP Phishycat is a phishing detection framework. It detects a phishing page and show alert to the user. Currently, it only supports chrome browser. This project also includes a plugin called "Phishblocker" to communicate with browser and back-end server. It can be extended in other platforms as well.

Description

P-1.jpg
OWASP Phishycat is a phishing detection framework. Main idea here is to guess the original domain that attacker is trying to phish. Next, it performs the test by doing real time image comparison and DOM analysis of both web pages (Original domain and phishing domain).

Original domains should be registered in project database before it goes for testing. Once it guess the domain name then it compares the real time images of both web pages (phishing site and original website) . Attacker will try to make the web page design look similar to original website as much as possible. If both images are similar to each other, then next step is to compare DOM of both web pages. If it does not match then there is a high chance that it is a phishing site. Because, we can say two web pages are similar only when every elements of the pages are identical. In this case, we have similar looking two websites but their DOM is different.

We take the phishing domain and try to match it with all the registered domain names. If similar looking domain name exist in project database then we do the real time image compare of both web pages. If image compare is true, we proceed with real time DOM analysis of both web pages.

Here we are assuming that phishing domain name is similar to original domain, which may not be the case always. In future, We can implement services like text analysis in a webpage and find the focused keywords, it will help us to get the idea of original domain.

In our MVP, we are not considering threshold for image comparing and DOM analysis. A little change in image and DOM can give us wrong result. There might be elements in web page which are designed to load dynamically every time we refresh the page. To avoid this problem, threshold values will be added in next release of OWASP Phishycat.

Licensing

OWASP Phishycat is free to use. It is licensed under the Apache License 2.0 https://apache.org/licenses/LICENSE-2.0.html

Project Resources

Current github: https://github.com/abhijitio/

Source Code

Documentation

Wiki Home Page

Issue Tracker

OWASP Kolkata

Project Leader

Abhijit Chatterjee

Related Projects

Classifications

Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png
Affero General Public License 3.0

News and Events

  • [18 May 2017] 1.0 Release Candidate is available for download. Any feedback (good or bad) in the next few weeks would be greatly appreciated.