1 of 18

Cybersecurity Tools

Lynne Cure, Aucoeur Ngo, Matthew Loussinian�Mentored by: Nicholas Tong

2 of 18

Overview

Onboarding

Sprint 1

Sprint 2

Review technologies:

  • Creating PostgreSQL db
  • Provisioning cloud instances
  • Deploying containerized applications

Vulnerability Scanning:

  • OWASP Amass
  • Nmap / Zenmap
  • Greenbone Vulnerability Manager

gophish

Phishing Campaign:

  • gophish
  • mailgun
  • office365

3 of 18

Phishing Simulation Campaign

What

To train employees on how to spot warning signs of a malicious email

Why

  • 75% of organizations globally experienced a phishing attack in 2020
  • 74% of attacks targeting US businesses were successful

With

gophish - a powerful, easy-to-use, open-source phishing toolkit

How

  • Create fake email with unassuming link
  • Create fake landing/login page prompting for login credentials

4 of 18

The Email

5 of 18

Legit Microsoft Login Page

6 of 18

Our Fake Login Page

🚫

7 of 18

Side By Side Comparison

🚫

8 of 18

Campaign Results

  • We sent this email to almost every employee of Amsys, in all about 140 people
  • In the end, 35 people clicked the link and 20 people inputted information into the fake landing page

9 of 18

Campaign Challenges

  • Emails being flagged outgoing & incoming SMTP server
  • Port issues on remote AWS machines
  • Not having valid SSL certificate for the fake domain
  • Initial issue generating reports because campaign name was too long and the SQL database didn’t like it

10 of 18

Vulnerability Scanning

What

Scan/mapping assets for potential vulnerabilities

Why

  • Identify security flaws that could lead to compromise of a system
  • Streamlines & semi-automates an otherwise tedious process of identifying & monitoring assets, esp. on large networks

With

OWASP Amass - In-depth attack surface mapping and asset discovery tool

nmap/zenmap - free and open source utility for network discovery and security auditing�Greenbone Vulnerability Manager - full-featured scan engine that using a collection of Network Vulnerability Tests (NVTs)

How

  • Enumerate all the subdomains and subnet blocks in use by an organization
  • Feed a list of those hosts into a vulnerability scan

11 of 18

amass enum -d eogresources.com -dir eog

amass enum subcommand makes a DNS enumeration of the subdomains of the target IP.

12 of 18

amass viz -d3 -dir eog

13 of 18

Greenbone Security Assistant

Using the enumeration from Amass, we used Greenbone Security Assistant to perform a vulnerability scan. First, we specified the targets by importing the text file with the listing of all the subdomains in the “Hosts” field of the New Target page (next slide).

14 of 18

Specifying Targets

15 of 18

Initiating the Scan

After specifying the target domains, we created a new scan with the newly specified targets from the previous slide.

16 of 18

Scan Results

17 of 18

Contact Us

18 of 18

Resources