dc.contributor.advisor | Patsakis, Constantinos | |
dc.contributor.advisor | Πατσάκης, Κωνσταντίνος | |
dc.contributor.author | Mangoyan, Vahram | |
dc.contributor.author | Μαγκογιάν, Βαχράμ | |
dc.date.accessioned | 2024-12-12T08:45:19Z | |
dc.date.available | 2024-12-12T08:45:19Z | |
dc.date.issued | 2024-09 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/17231 | |
dc.identifier.uri | http://dx.doi.org/10.26267/unipi_dione/4654 | |
dc.format.extent | 55 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ελλάδα | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/gr/ | * |
dc.title | Phishing framework with MFA bypassing | el |
dc.title.alternative | Παράκαμψη MFA μέσω phishing | el |
dc.type | Bachelor Dissertation | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Πληροφορικής | el |
dc.description.abstractEN | In the reported thesis is described with detail all the process of MITM (Man-in-the-middle) attack and how it operates, furthermore this project is also focused on all the required technical steps for the remote deployment of EvilGophish framework. Also both a thorough presentation of an MFA bypassing attack (MITM attack with the respective framework) and the total cost of all the deployment and the attack engagement are also included in the study. | el |
dc.subject.keyword | MFA bypassing | el |
dc.subject.keyword | Evilginx | el |
dc.subject.keyword | Gophish | el |
dc.subject.keyword | EvilGophish | el |
dc.subject.keyword | Phishing Framework | el |
dc.subject.keyword | Reverse Proxy | el |
dc.subject.keyword | Cost of an actual phishing engagement | el |
dc.date.defense | 2024-11-01 | |