FraudFence, a machine learning tool designed to detect phishing websites by analysing their features. FraudFence includes various website reconnaissance features, such as Whois lookup, port scanning, DNS lookup, server location checking, web header checking, SSL information, trace route, directory busting, and web risk rating. The tool uses a random forest classifier to analyse website features and determine their legitimacy.
Note: This is an assignment project for ICT 2206 Web Security
Singapore Institute of Technology Bachelor of Engineering with Honours in Information and Communications Technology majoring in Information Security
FraudFence can be installed locally by following these steps:
- Clone the repository to your local machine.
git clone https://github.com/Brockkoli/FraudFence.git
- Install the required dependencies listed in
requirements.txt
.
cd FraudFence
pip install -r requirements.txt
- Run
python mainMenu.py
to start the application.
-
Whois
-
register for an API key here: https://rapidapi.com/whoisapi/api/whois-v2/
-
Port scan
- default: top 1000 most common ports
- all: 65535 ports
- custom range: 1-80 for eg
-
DNS lookup
-
Server location checker
-
Web header checker
-
SSL information
-
Trace route
-
Directory busting
- can use own wordlists
-
Web risk rating
- register for an API key here: https://rapidapi.com/mywot-mywot-default/api/wot-web-risk-and-safe-browsing
-
Print report
- generate as report.html
-
Machine learning URL analyser
-
Graphical User Interface
-
Chrome extension
- Google safe browsing
- register for an API key here: https://developers.google.com/safe-browsing/v4
- Web of Trust (WOT) database
- register for an API key here: https://rapidapi.com/mywot-mywot-default/api/wot-web-risk-and-safe-browsing
- Google safe browsing
To use FraudFence, simply enter the URL of the website you want to analyse in the input field and press enter. The tool will perform the analysis, and display the result on the screen.