rss-bridge
2026-02-25T06:15:44+00:00
Starkiller Phishing Kit: Why MFA Fails Against Real-Time Reverse Proxies — Technical Analysis + Rust PoC for TLS Fingerprinting
Author here. Starkiller got my attention this week — Abnormal AI's disclosure of a PhaaS platform that proxies real login pages instead of cloning them. I wrote a technical breakdown of the AitM flow, why traditional defences (including MFA) fail, and concrete detection strategies including TLS fingerprinting. I also released ja3-probe, a zero-dependency Rust PoC that parses TLS ClientHello messages and classifies clients against known headless browser / proxy fingerprints. submitted by /u/Reversed-Engineer-01 [link] [comments]
Source: https://www.reddit.com/r/netsec/comments/1re5gds/starkiller_phishing_kit_why_mfa_fails_against/