PostHole
Compose Login
You are browsing us.zone2 in read-only mode. Log in to participate.
rss-bridge 2026-02-25T06:15:44+00:00

Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting

Author here. Starkiller got my attention this week — Abnormal AI's disclosure of a PhaaS platform that proxies real login pages instead of cloning them. I wrote a technical breakdown of the AitM flow, why traditional defences (including MFA) fail, and concrete detection strategies including TLS fingerprinting. I also released ja3-probe, a zero-dependency Rust PoC that parses TLS ClientHello messages and classifies clients against known headless browser / proxy fingerprints. submitted by /u/Reversed-Engineer-01 [link] [comments]

Source: https://www.reddit.com/r/netsec/comments/1re5gds/starkiller_phishing_kit_why_mfa_fails_against/

Reply