Cybersecurity Tools
Lynne Cure, Aucoeur Ngo, Matthew Loussinian�Mentored by: Nicholas Tong
Overview
Onboarding
Sprint 1
Sprint 2
Review technologies:
Vulnerability Scanning:
gophish
Phishing Campaign:
Phishing Simulation Campaign
What | To train employees on how to spot warning signs of a malicious email |
Why |
|
With | gophish - a powerful, easy-to-use, open-source phishing toolkit |
How |
|
The Email
Legit Microsoft Login Page
✅
Our Fake Login Page
🚫
Side By Side Comparison
✅
🚫
Campaign Results
Campaign Challenges
Vulnerability Scanning
What | Scan/mapping assets for potential vulnerabilities |
Why |
|
With | OWASP Amass - In-depth attack surface mapping and asset discovery tool nmap/zenmap - free and open source utility for network discovery and security auditing�Greenbone Vulnerability Manager - full-featured scan engine that using a collection of Network Vulnerability Tests (NVTs) |
How |
|
amass enum -d eogresources.com -dir eog
amass enum subcommand makes a DNS enumeration of the subdomains of the target IP.
amass viz -d3 -dir eog
Greenbone Security Assistant
Using the enumeration from Amass, we used Greenbone Security Assistant to perform a vulnerability scan. First, we specified the targets by importing the text file with the listing of all the subdomains in the “Hosts” field of the New Target page (next slide).
Specifying Targets
Initiating the Scan
After specifying the target domains, we created a new scan with the newly specified targets from the previous slide.
Scan Results
Contact Us
Resources