Phishing For Phun!
By Kristoffer Marshall
@CrunkComputing
Photos totally allowed.
Disclaimer
I, nor my employer, are responsible for the actions of attendees or anyone who has access to this presentation. All information contained in this presentation is for educational purposes only.
About Kristoffer Marshall
(Kristoff)
“The security aspect of cyber is very very tough. And maybe it's hardly doable.” - Donald Trump
What is phishing?
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
- Wikipedia
Phishing email usually has the following things:
What are the threats of phishing?
Sometimes employees even forward phishing emails to others, for various reasons. When that happens, it kinda looks like this:
Why does phishing work?
Curiosity is obviously the fun one.
Why should we phish our employees?
Phishing vs. Spam
Phishing email is technically spam, but spam is not just phishing email.
For instance, this is phishing:
This is just spam:
We have 4 days fully comprehensive PMP(R) - Project Management Professional Training scheduled on below mentioned dates.
Location : Detroit ,MI
Batch 1 : Mar 28th - 31st 2016
To know more call @323 982 8682
Hey John! Can you send me the account details for the deal we just signed?
Unfolding of Events (1/2)
What I was doing at this point
Unfolding of Events (2/2)
Statistics
How the attack process works
On to the good stuff - Prep
Uh-oh!
Things I didn’t consider, but definitely will next time:
Postfix
VPS
Cheap options include:
Check out lowendbox.com for some good deals. Or just host your own server.
DNS - Homoglyphs
DNS - Miscellaneous
Let’s Encrypt!
Yes, you too can have an encrypted website for FREE! Do it. People trust HTTPS sites. Browsers complain less about HTTPS sites.
Email process
“I made a mistake using a private email.” - Hillary Clinton, last week
Developing the phishing script
I took the list of names and email addresses and formatted them into a CSV as follows:
Then I created a completely random string with apg.
Which creates something like this:
John Doe,jdoe@example.com
Jane Doe,jdoe1@example.com
Kevin Mitnick,kmitnick@example.com
IFS=$'\n'; for x in $(awk -F, '{print $1","$2","}' email-addresses.csv); do echo -n $x; apg -a 1 -M nc -n1 -m 32 | tr '[:upper:]' '[:lower:]' ; done > email-addresses-hashed.csv
John Doe,jdoe@example.com,l8w74t2ua9r0u7hdhgius8253u5p0k1i
Jane Doe,jdoe1@example.com,rva2qdw563r787rm1l3ec8w0mlejhir3
Developing the phishing script
./sendEmail John jdoe@example.com gzosbis9mphkw3ei9wugaigkonow1dum
Sending out the email
To send out email, each line looks something like this:
Easy right? Just create a BASH loop. I tried, but I was seeing some very unexpected results. Instead, I created a BASH script to be executed:
./sendEmail John jdoe@examplecom 6ecfe51d4fead49d3c4ac13b537a0d8f
./sendEmail Joe Schmoe jschmoe@example.com 4abe5c529fa35858fec60718f1cf2272
[ … ]
IFS=$'\n'; for x in $(cat email-addresses-hashed | awk -F, '{split($1,a," "); print a[1]" "$2" "$3}'); do echo -e "./sendEmail ${x}\nsleep .3" ; done > sendPhish.sh
What the user pretty much saw
(email)
What the user didn’t actually see (email footer)
This communication and any attached files may contain information that is not confidential or privileged. This is a simulated phishing attempt and will not harm your computer. If you are reading the entirety of this message, good job. Please do not click the link as the event will be logged.
Website process
The Wrapper Page
clicked.log
The Login Page (index.html.template)
<input class="login-form" type="password" id="logPassword" value="" maxlength="64" autocorrect="off" autocapitalize="off" placeholder="Password">
Copy a pre-existing page and modify
Create your own official-looking login page
The Intermediary Page
submitted.log
Login Page
What the user saw
after trying to log in
What a random winner won
What a random culprit won
Other considerations
That’s all there is to it!
Q&A
For the latest version of this presentation
Twitter: @CrunkComputing
How’s my driving?
Tell me what you think!
How can I improve this presentation?