casting with the pros
play

Casting with the Pros Tips and Tricks for Effective Phishing Nathan - PowerPoint PPT Presentation

Casting with the Pros Tips and Tricks for Effective Phishing Nathan Sweaney @sweaney nathan@secureideas.com Nathan Sweaney Security Consultant with Secure Ideas BSidesOK Organizer ISSA Oklahoma OWASP Tulsa @sweaney


  1. Casting with the Pros Tips and Tricks for Effective Phishing Nathan Sweaney @sweaney nathan@secureideas.com

  2. Nathan Sweaney • Security Consultant with Secure Ideas • BSidesOK Organizer • ISSA Oklahoma • OWASP Tulsa • @sweaney • nathan@secureideas.com secureideas.com

  3. Agenda Campaign Design Targeting Infrastructure Setup Bypassing Defenses secureideas.com

  4. Why Phish? • Meatware is vulnerable • Recent Breaches • User Awareness Training • Executive Impact secureideas.com

  5. Latest & Greatest Executable Payloads secureideas.com

  6. Campaign Design secureideas.com

  7. Campaign Design > Assessment Goals • What’s the org hoping to get? • Goal-oriented tests vs Awareness training • Consider white-box/grey-box testing • Levels of Simulation secureideas.com

  8. Campaign Design > Desired Outcome • Click links to a malicious site • Download & execute a file • Remote access • Provide credentials • XSS • Establish rapport secureideas.com

  9. Campaign Design > Ruse Considerations • Use current events – Especially emotionally-charged events – But be careful • Holidays • Target-specific situations • Existing technologies secureideas.com

  10. Campaign Design > Domain Name Selection • Start with Recon – Learn what the target is used to seeing 3 rd Party services? (HR, Payroll, Training, etc) – • Familiar/Similar Domains – companymail.com – mail.company.mailserver.com • Generic Domains – mail-sender.com – eventcoordinator.com • Punycode – portal.xn--securideas-f7a.com – portal.securéideas.com – www.xn--securedeas-2ub.com – www.secureıdeas.com secureideas.com

  11. Campaign Design > Use Psychology • Humans are easily controllable – Urgency – Emotion – Familiarity – Eagerness to help/serve • Critical Faculty – Spell check – Mimic email signatures – Realistic & similar domains – Context-appropriate language – Existing conversations • Be Evil secureideas.com

  12. But not TOO evil secureideas.com

  13. Examples secureideas.com

  14. secureideas.com

  15. secureideas.com

  16. secureideas.com

  17. secureideas.com

  18. Targeting secureideas.com

  19. Targeting > Number of Victims • One/Several/Everyone? • Remember the goal • Response Time • Prairie dog issue secureideas.com

  20. Targeting > Victim Type • Particularly vulnerable – Legal – HR – Accounting – Sales • Particularly privileged – Sys Admins/Network Admins – Executives – Helpdesk secureideas.com

  21. Targeting > Finding Victims • Social Media – LinkedIn • Lead Generation sites – site:zoominfo.com “domainname.com" – Bizshark – Pipl – Clearbit – RIP data.com • Tools – Recon-ng – theHarvester – datasploit secureideas.com

  22. Targeting > Finding More Victims • The company’s website – Blog – Metadata • 3 rd Party tools – Github • Data breach dumps • AD • Phishing/Vishing secureideas.com

  23. Infrastructure secureideas.com

  24. Infrastructure > SMTP Server • Your laptop • Hosted – AWS/Azure/etc (cloud-based) – Gmail/Office365 – MailChimp, SendGrid, etc – Target’s mail servers (open relays) • Considerations – Server age – Domain age – IP Reputations secureideas.com

  25. Infrastructure > Technology • Sendmail • Toolkits – GoPhish – Modlishka – Evilginx2 – Phishing Frenzy – King Phisher – Social Engineering Toolkit • LetsEncrypt • PhishMe, KnowBe4, etc secureideas.com

  26. Infrastructure > Alternatives to Email • SMS • Facebook/Twitter/LinkedIn • What’s App • Slack • NextDoor • Think outside the box – Suspicion is context-sensitive secureideas.com

  27. Bypassing Defenses secureideas.com

  28. Bypassing Defenses > Anti-malware • AV – https://github.com/Veil-Framework/Veil – Online Scanners • VirusTotal • MetaScan (https://metadefender.opswat.com) • VirSCAN (http://www.virscan.org) • NoDistribute (https://nodistribute.com) • Hybrid Analysis (https://www.hybrid-analysis.com) • Watch out for automated sandbox analysis • EDR Tools – Good luck – Keep it simple secureideas.com

  29. Bypassing Defenses > Content Filtering • Content Filtering Submission Forms Symantec/Bluecoat https://sitereview.bluecoat.com/#/ – WatchGuard/ForcePoint/Websense – http://mtas.surfcontrol.com/mtas/WatchGuardTest-a-Site.php Cisco Umbrella/OpenDNS – https://community.opendns.com/domaintagging/submit/ Cisco/Talos – https://talosintelligence.com/reputation_center/support Palo Alto https://urlfiltering.paloaltonetworks.com/query/ – Barracuda http://www.barracudacentral.org/report – McAfee https://trustedsource.org – • Recently Expired Domains https://www.expireddomains.net – https://freshdrop.com – secureideas.com

  30. Bypassing Defenses > Anti-Spam • SPF, DKIM, & DMARC • Consider sending via Gmail or O365 • Check Blacklists – https://www.talosintelligence.com/reputation_center • Online Spam Checks – Google’s Postmaster Tools https://postmaster.google.com – SenderScore https://www.senderscore.org – Mail Tester https://www.mail-tester.com • Discuss with the client secureideas.com

  31. Bypassing Defenses > Landing Pages • Duplicate real sites vs Build your own • Unique user identifiers • Source IP restrictions – Automated sandbox analysis • Time restrictions • JavaScript obfuscation • Subdomains vs directories secureideas.com

  32. Bypassing Defenses > Payloads • Constant battle – No more shikata-ga-nai • Use hosted known sites • Test, Burn, & repeat • “Encrypted” Excel file secureideas.com

  33. Final Thoughts • Remember the goal • Use back channels with clients • Keep it simple • Make it familiar • Don’t be TOO evil secureideas.com

  34. Questions? Nathan Sweaney @sweaney nathan@secureideas.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend