SlideShare a Scribd company logo
Dark	
  Fairytales	
  from	
  a	
  
Phisherman	
  
@an4snatchor	
  –	
  HackPra	
  AllStars	
  2015	
  
Outline	
  
•  whoami	
  
•  Fishing	
  ===	
  Phishing	
  
•  Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
•  Fairytalessss	
  
•  PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
•  Outro	
  
whoami	
  
•  Pentester	
  &	
  Vuln	
  researcher	
  
•  BeEF	
  lead	
  core	
  developer	
  
•  Browser	
  Hacker’s	
  Handbook	
  co-­‐author	
  
•  (ex)	
  Surf	
  Cas4ng	
  pro	
  fisherman	
  
•  (current)	
  Phisherman	
  
Phisherman	
  	
  
prepara,on	
  
Fishing	
  ===	
  Phishing	
  
	
  
(F):	
  Prepare	
  bait	
  and	
  cast	
  it	
  
(P):	
  Prepare	
  pretext,	
  phishing	
  strategy,	
  	
  
	
  	
  	
  	
  	
  	
  	
  and	
  send	
  emails	
  
(F):	
  Wait	
  for	
  something	
  interested	
  on	
  the	
  bait	
  
(P):	
  Wait	
  for	
  vic4ms	
  to	
  click	
  on	
  your	
  links,	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
enter	
  creden4als,	
  open/execute	
  stuff	
  
(F):	
  you	
  got	
  a	
  big	
  fish	
  
(P):	
  you	
  got	
  a	
  shell	
  on	
  the	
  
company’s	
  CFO	
  laptop	
  
Fishing	
  ===	
  Phishing	
  
	
  
•  End-­‐users	
  are	
  some4mes	
  more	
  stupid	
  than	
  
saltwater	
  fishes	
  
– Fishes	
  do	
  evolve:	
  you	
  have	
  to	
  use	
  smaller	
  hooks	
  
and	
  Fluorocarbon	
  lines	
  for	
  increased	
  stealth	
  
– Humans	
  apparently	
  do	
  not	
  evolve:	
  we’re	
  doing	
  
phishing	
  with	
  15	
  years	
  old	
  aZacks	
  that	
  s4ll	
  work	
  
•  MS	
  Office	
  macros	
  
•  HTA	
  files	
  
•  Custom	
  .exe	
  files	
  	
  
Fishing	
  ===	
  Phishing	
  
	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
•  If	
  you	
  do	
  phishing,	
  you	
  know	
  that:	
  
– Every	
  4me	
  it’s	
  a	
  different	
  story	
  
– Configura4on	
  overhead	
  some4mes	
  is	
  a	
  killer	
  
– You	
  can	
  iden4fy	
  repeatable	
  paZerns	
  
– You	
  need	
  automa4on	
  
– Speed	
  is	
  key	
  once	
  you	
  got	
  access	
  to	
  vic4ms	
  assets	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  •  Meet	
  PhishLulz	
  
– phishing	
  automa4on	
  in	
  Ruby	
  
•  Puts	
  together	
  PhishingFrenzy	
  +	
  BeEF	
  on	
  a	
  
dedicated	
  Amazon	
  EC2	
  image	
  
– Cheers	
  @zeknox	
  for	
  crea4ng	
  PF	
  !!!	
  	
  
•  Current	
  features:	
  
– Mass	
  mailing	
  with	
  HTML	
  templates	
  (SET…LOL)	
  
– Highly	
  configurable	
  template	
  system	
  	
  
– HTTP/HTTPS	
  support	
  
– Creden4al	
  harves4ng	
  
– BeEF	
  integra4on	
  	
  
•  Correlate	
  vic4m	
  name/email	
  with	
  OS/browser	
  
fingerprin4ng	
  including	
  geoloca4on	
  
•  Automate	
  client-­‐side	
  aZacks	
  via	
  BeEF	
  modules	
  
– Repor4ng	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
•  What	
  is	
  led	
  to	
  the	
  consultant	
  as	
  a	
  manual	
  step:	
  
– Phishing	
  domain	
  selec4on/configura4on	
  (A/MX/
CNAME	
  records,	
  as	
  well	
  as	
  SPF/DKIM	
  TXT	
  records)	
  
– Configuring/star4ng	
  the	
  phishing	
  campaign	
  
•  If	
  an	
  exis4ng	
  phishing	
  template	
  can	
  be	
  used	
  this	
  takes	
  2	
  
minutes	
  
– Eventually	
  crea4ng/modifying	
  a	
  phishing	
  template	
  
or	
  client-­‐side	
  vector	
  
– Wait	
  for	
  browser	
  hooks,	
  harvested	
  creden4als	
  and	
  
shells	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
•  Amazon	
  advantages:	
  
– domain/IP	
  blacklisted?	
  	
  
– Fixed	
  with	
  2	
  steps:	
  
•  Reboot	
  the	
  AWS	
  instance	
  
•  Update	
  the	
  A	
  record	
  for	
  your	
  main	
  phishing	
  domain	
  
– Good	
  IP	
  block	
  reputa4on	
  
– Cheap,	
  zero	
  maintenance	
  
•  T2.small	
  -­‐>	
  0.026$/hours	
  -­‐>	
  0.6$/day	
  -­‐>	
  3.12	
  $/5days	
  
Fairytale	
  1	
  (s/lulz/real_target_name/)	
  
•  Target:	
  www.lulz.wa.gov.au	
  (GMT+8)	
  
– Discovered	
  during	
  reconnaissance:	
  
•  Webmail.lulz.com:	
  Outlook	
  WebAccess	
  
•  Vpn1.lulz.com:	
  Checkpoint	
  SSL	
  VPN	
  
– OWA	
  template	
  	
  (phishing	
  +	
  email	
  pretext)	
  
available	
  in	
  PF	
  
– Registered	
  lulz-­‐wa-­‐gov-­‐au.com	
  
Fairytale	
  1	
  
•  Started	
  campaign	
  with	
  46	
  targets	
  at	
  13:30	
  target	
  4me	
  
Fairytale	
  1	
  
•  Started	
  campaign	
  with	
  46	
  targets	
  at	
  13:30	
  target	
  4me	
  
Fairytale	
  1	
  
•  In	
  less	
  than	
  3	
  hours	
  
(by	
  5PM	
  COB	
  in	
  the	
  
target	
  4mezone):	
  
39%	
  success	
  rate	
  
Harvested	
  creden4als	
  
	
  
Domain	
  creden4als	
  
	
  
VPN	
  creden4als	
  
Fairytale	
  1	
  
Fairytale	
  1	
  
Fairytale	
  1	
  
•  Results:	
  
–  Gov	
  network	
  compromised	
  (including	
  AD)	
  
–  Pure	
  blackbox	
  -­‐>	
  client-­‐side	
  -­‐>	
  internal	
  pentest	
  
–  Overall	
  4me	
  spent:	
  	
  
•  4	
  hours	
  prepara4on/recon	
  	
  	
  
•  2	
  days	
  harves4ng/pwning	
  
–  Total	
  cost:	
  	
  
•  About	
  2	
  $	
  for	
  the	
  EC2	
  cost	
  
•  About	
  8	
  $	
  for	
  the	
  domain	
  registra4on	
  
10	
  $	
  total	
  cost	
  	
  
Fairytale	
  1	
  
•  Results:	
  
–  Gov	
  network	
  compromised	
  (including	
  AD)	
  
–  Pure	
  blackbox	
  -­‐>	
  client-­‐side	
  -­‐>	
  internal	
  pentest	
  
–  Overall	
  4me	
  spent:	
  	
  
•  4	
  hours	
  prepara4on/recon	
  	
  	
  
•  2	
  days	
  harves4ng/pwning	
  
–  Total	
  cost:	
  	
  
•  About	
  2	
  $	
  for	
  the	
  EC2	
  cost	
  
•  About	
  8	
  $	
  for	
  the	
  domain	
  registra4on	
  
10	
  $	
  total	
  cost	
  	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
•  Debian	
  7	
  AMI	
  on	
  Amazon	
  EC2	
  
– Can	
  be	
  used	
  with	
  t2.small	
  profile	
  (1	
  vcore/2GB	
  ram)	
  
– Loosely	
  coupled	
  with	
  Amazon:	
  it	
  can	
  be	
  used	
  with	
  
other	
  cloud	
  providers	
  or	
  your	
  own	
  infrastructure	
  
too	
  
– Relies	
  on	
  the	
  FOG	
  gem	
  
•  Support	
  for	
  Rackspace,	
  Linode,	
  Dreamhost,	
  XenServer,	
  
libvirt,	
  OpenVZ	
  
•  hZp://fog.io/about/provider_documenta4on.html	
  
Badass	
  phishing	
  at	
  cost	
  (almost)	
  zero	
  
	
  
•  The	
  (private)	
  AMI	
  has	
  the	
  following	
  installed:	
  
– PhishingFrenzy	
  (custom	
  version)	
  
– BeEF	
  
– Apache/MySQL/PostgreSQL	
  
– More	
  stuff	
  to	
  be	
  added	
  in	
  the	
  (near)	
  future:	
  	
  
•  metasploit	
  
•  recon-­‐ng	
  
•  Veil	
  
•  URLcrazy	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
•  PhishLulz	
  ruby	
  script	
  video	
  demo	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
•  PhishLulz	
  phishing	
  video	
  demo	
  
Fairytale	
  2	
  
•  The	
  Telegraph	
  UK	
  asked	
  us	
  to	
  target	
  a	
  specific	
  
journalist	
  (Sept	
  2014).	
  Info	
  provided:	
  
– Name:	
  Sophie	
  Cur4s	
  
– Not	
  much	
  info	
  from	
  reconnaissance	
  
– Target	
  writes	
  about	
  IT	
  stuff,	
  breaches,	
  and	
  so	
  on	
  
– Together	
  with	
  a	
  brazilian	
  friend	
  of	
  mine	
  we	
  did	
  the	
  
engagement	
  
•  You	
  will	
  not	
  find	
  our	
  names	
  here:	
  h"p://
www.telegraph.co.uk/technology/internet-­‐security/
11153381/How-­‐hackers-­‐took-­‐over-­‐my-­‐computer.html	
  	
  
Fairytale	
  2	
  
•  AZack	
  plan:	
  
– Generic	
  LinkedIn	
  invite	
  phishing	
  campaign	
  
•  Aim:	
  profile	
  the	
  journalist	
  OS/browser/plugins	
  with	
  BeEF	
  
•  Aim	
  2:	
  detect	
  mail	
  provider/tech	
  
– Ader	
  fingerprin4ng,	
  3	
  client-­‐side	
  aZacks	
  op4ons	
  
1.  Custom	
  encoded	
  .exe	
  inside	
  password	
  encrypted	
  .rar	
  
2.  Word	
  document	
  with	
  Powershell	
  macro	
  
3.  HTA	
  aZack	
  targeted	
  to	
  Internet	
  Explorer	
  
Fairytale	
  2	
  
•  LinkedIn	
  aZack	
  (template	
  in	
  PF):	
  
Fairytale	
  2	
  
•  OS,	
  browser	
  and	
  plugin	
  fingerprint	
  via	
  BeEF	
  
– Note:	
  Office	
  2012,	
  Java	
  1.7u51,	
  Citrix	
  ICA	
  Client	
  
Fairytale	
  2	
  
•  Credible	
  Pretext	
  (snip):	
  
Fairytale	
  2	
  
•  Credible	
  Pretext	
  (snip):	
  
Fairytale	
  2	
  
•  Via	
  the	
  ini4al	
  fingerprin4ng	
  we	
  iden4fied	
  that	
  
the	
  vic4m	
  was	
  using	
  Gmail	
  for	
  Business	
  
– Encrypted	
  .zip	
  is	
  not	
  an	
  op4on,	
  filename	
  leak	
  
– “Good”	
  an4spam/AV	
  
– Phishing	
  domain	
  with	
  SPF/DKIM	
  
– Encrypted	
  .rar	
  with	
  custom	
  .exe	
  inside	
  
Fairytale	
  2	
  
•  Payload:	
  
– .exe	
  file	
  with	
  3	
  connect-­‐back	
  mechanisms	
  
•  Reverse	
  hZps	
  
•  Reverse	
  DNS	
  
•  OOB	
  extrusion	
  via	
  Outlook	
  profile	
  
– Custom	
  encoding	
  
– Adobe	
  PDF	
  modified	
  icon	
  +	
  long	
  Win	
  filename	
  trick	
  
– Custom	
  MsgBox	
  with	
  PDF	
  icon	
  (msg:	
  “Adobe	
  Reader	
  
could	
  not	
  open	
  xxx.pdf”)	
  
Fairytale	
  2	
  
•  The	
  vic4m	
  believed	
  in	
  the	
  pretext,	
  she	
  even	
  replied	
  back	
  
once	
  double	
  clicked	
  the	
  payload	
  asking	
  for	
  more	
  clarifica4on	
  
•  Camera/microphone	
  access.	
  Game	
  over	
  
Fairytale	
  2	
  
•  Plan-­‐B	
  was	
  ready	
  in	
  case	
  of	
  Plan-­‐A	
  failure	
  
Fairytale	
  2	
  
•  Plan-­‐B	
  was	
  ready	
  in	
  case	
  of	
  Plan-­‐A	
  failure	
  
More	
  Fairytales?	
  
•  Wait	
  for	
  the	
  new	
  BeEF	
  Autorun	
  Engine	
  
– More	
  shells,	
  automated	
  aZacks	
  
– In	
  the	
  mean4me,	
  if	
  you	
  can’t	
  wait,	
  enjoy:	
  
•  InsomniHack’14	
  talk	
  with	
  @kkotowicz	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
h"p://www.slideshare.net/micheleorru2/when-­‐you-­‐dont-­‐
have-­‐0days-­‐clientside-­‐exploitaCon-­‐for-­‐the-­‐masses	
  
•  Browser	
  Hacker’s	
  Handbook	
  videos	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
h"p://browserhacker.com/videos/videos_index.html	
  	
  
•  My	
  Vimeo	
  channel	
  h"ps://vimeo.com/user1924142	
  
	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
•  Work	
  in	
  progress	
  
– integra4on	
  with	
  UrlCrazy	
  and	
  domain	
  registra4on	
  
providers	
  for	
  automa4c	
  phishing	
  domain	
  
sugges4on	
  and	
  registra4on/configura4on	
  
– Automa4c	
  campaign	
  configura4on	
  based	
  on	
  
phishing	
  profiles	
  
•  Outlook	
  WebAccess	
  
•  LinkedIn	
  
•  HTA/browser	
  extensions/etc..	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
•  Work	
  in	
  progress	
  
– More	
  repor4ng	
  capabili4es	
  (currently	
  Excel):	
  
– More	
  graphs	
  
•  Campaign	
  4me	
  graph	
  with	
  clicks/submissions	
  4mestamps	
  
•  Browser	
  type/version/plugins	
  and	
  OS	
  type	
  count	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  •  Work	
  in	
  progress	
  
– BeEF	
  server-­‐side	
  ARE	
  (autorun	
  rule	
  engine)	
  
– Create	
  separate	
  autorun	
  profiles	
  for	
  different	
  
client-­‐side	
  aZacks	
  (new	
  profiles	
  can	
  be	
  added	
  at	
  
run4me)	
  
•  Internet	
  explorer	
  -­‐>	
  autorun_hta.json	
  
•  Chrome/Firefox	
  -­‐>	
  autorun_mal_extension.json	
  
•  Chrome/Firefox	
  -­‐>	
  get	
  WebRTC	
  internal	
  IP	
  address,	
  
start	
  enumera4ng	
  internal	
  network	
  
–  IPC/IPX	
  (see	
  my	
  previous	
  HackPra	
  AllStars	
  presenta4on)	
  
–  Blind	
  XSRF	
  on	
  home	
  routers,	
  or	
  Shellshock	
  aZacks	
  on	
  
embedded	
  Linux	
  devices	
  (NAS/routers/cameras/etc..)	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
PhishingFrenzy	
  +	
  BeEF	
  FTW	
  
	
  
…	
  BTW	
  That’s	
  not	
  the	
  ISIS	
  black	
  flag,	
  just	
  BeEF	
  offline	
  browsers	
  …	
  
Outro	
  
Hope	
  you	
  enjoyed	
  the	
  
dark	
  fairytales!	
  
	
  

More Related Content

PDF
Dark Fairytales from a Phisherman (Vol. II)
PDF
Practical Phishing Automation with PhishLulz - KiwiCon X
PDF
Rooting your internals - Exploiting Internal Network Vulns via the Browser Us...
PDF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
PDF
I'm the butcher would you like some BeEF
PDF
Buried by time, dust and BeEF
PDF
ZeroNights2012_BeEF_Workshop_antisnatchor
PDF
SANS DFIR Prague: PowerShell & WMI
Dark Fairytales from a Phisherman (Vol. II)
Practical Phishing Automation with PhishLulz - KiwiCon X
Rooting your internals - Exploiting Internal Network Vulns via the Browser Us...
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
I'm the butcher would you like some BeEF
Buried by time, dust and BeEF
ZeroNights2012_BeEF_Workshop_antisnatchor
SANS DFIR Prague: PowerShell & WMI

What's hot (20)

PDF
Html5: Something wicked this way comes (Hack in Paris)
PPT
Dmk Bo2 K7 Web
PPT
Design Reviewing The Web
PDF
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
PPTX
Catch Me If You Can: PowerShell Red vs Blue
PPTX
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
PPT
BSidesJXN 2016: Finding a Company's BreakPoint
PPTX
Obfuscating The Empire
PDF
Krzysztof Kotowicz - Hacking HTML5
PDF
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
PPTX
Domino Security - not knowing is not an option (2016 edition)
PDF
NotaCon 2011 - Networking for Pentesters
PDF
A @textfiles approach to gathering the world's DNS
PPTX
Anirban webappsecusa2014
PDF
tus.io – Resumable file uploads for web and mobile apps by Felix Geisendörfer
PPT
Resumable File Upload API using GridFS and TUS
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
PPTX
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
PPT
Tus.io presentation for iOS devscout meetup
PDF
Building real time applications with Symfony2
Html5: Something wicked this way comes (Hack in Paris)
Dmk Bo2 K7 Web
Design Reviewing The Web
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Catch Me If You Can: PowerShell Red vs Blue
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
BSidesJXN 2016: Finding a Company's BreakPoint
Obfuscating The Empire
Krzysztof Kotowicz - Hacking HTML5
DEF CON 27 - BEN SADEGHIPOUR - owning the clout through ssrf and pdf generators
Domino Security - not knowing is not an option (2016 edition)
NotaCon 2011 - Networking for Pentesters
A @textfiles approach to gathering the world's DNS
Anirban webappsecusa2014
tus.io – Resumable file uploads for web and mobile apps by Felix Geisendörfer
Resumable File Upload API using GridFS and TUS
Cracking Into Embedded Devices - HACK.LU 2K8
Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@('Tech','niqu...
Tus.io presentation for iOS devscout meetup
Building real time applications with Symfony2
Ad

Viewers also liked (16)

PPTX
Formación continua para el empleo
DOCX
What are the elements of a fairy tale abstract
PPTX
Deep to the roots of the world’s fairytales
PPTX
The Computer Ate My Homework’ and Other Fairytales - 2014 Brightspace Wiscons...
PPTX
The elements of a fairy tale and the
PPT
PDF
Programa JUVENTUDES- Informe 2013
PPT
Jolly Postman
PPTX
How Fairytales Have Impact On Healing
PDF
When you don't have 0days: client-side exploitation for the masses
PPT
Fairy Tale Elements
PPT
Fairytales Powerpoint
PPTX
Cinderella Short Story
PPSX
Fairytales
PDF
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
PPT
Elements of a fairytale
Formación continua para el empleo
What are the elements of a fairy tale abstract
Deep to the roots of the world’s fairytales
The Computer Ate My Homework’ and Other Fairytales - 2014 Brightspace Wiscons...
The elements of a fairy tale and the
Programa JUVENTUDES- Informe 2013
Jolly Postman
How Fairytales Have Impact On Healing
When you don't have 0days: client-side exploitation for the masses
Fairy Tale Elements
Fairytales Powerpoint
Cinderella Short Story
Fairytales
Biting into the forbidden fruit. Lessons from trusting Javascript crypto.
Elements of a fairytale
Ad

Similar to Dark Fairytales from a Phisherman (20)

PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PDF
Wfuzz para Penetration Testers
PPT
Firewalls (Distributed computing)
PDF
Lena Yu aka LambdaMamba - Plenty of Phish in the Sea: Collecting and Investig...
PDF
Melanie Rieback - The Good, the Bad, and the Ugly
PPTX
Phishing Attacks - Are You Ready to Respond?
PDF
Are There Any Domains Impersonating Your Company For Phishing?
PDF
Hacking 09 2010
PPTX
So You Want to be a Hacker?
PPT
The Phishing Ecosystem
PDF
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
PDF
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
PDF
The (in)security of File Hosting Services
PPTX
How I Will Phish You
PDF
Fantastic Beasts and where to hide from them
PDF
Hitbkl 2012
 
PPTX
Aaron Higbee - The Humanity of Phishing Attack & Defense
PPTX
Aaron Higbee - The Humanity of Phishing Attack & Defense
PPT
If i wake evil 360
PPTX
NASA Cyber Security Webinar: Phishing Detection Strategies
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Wfuzz para Penetration Testers
Firewalls (Distributed computing)
Lena Yu aka LambdaMamba - Plenty of Phish in the Sea: Collecting and Investig...
Melanie Rieback - The Good, the Bad, and the Ugly
Phishing Attacks - Are You Ready to Respond?
Are There Any Domains Impersonating Your Company For Phishing?
Hacking 09 2010
So You Want to be a Hacker?
The Phishing Ecosystem
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
The (in)security of File Hosting Services
How I Will Phish You
Fantastic Beasts and where to hide from them
Hitbkl 2012
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
If i wake evil 360
NASA Cyber Security Webinar: Phishing Detection Strategies

Recently uploaded (20)

PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPT
256065457-Anaesthesia-in-Liver-Disease-Patient.ppt
PDF
Project English Paja Jara Alejandro.jpdf
PDF
“Google Algorithm Updates in 2025 Guide”
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
PPTX
ENCOR_Chapter_11 - ‌BGP implementation.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
PPTX
ENCOR_Chapter_10 - OSPFv3 Attribution.pptx
PDF
Generative AI Foundations: AI Skills for the Future of Work
PDF
Testing WebRTC applications at scale.pdf
PDF
5g is Reshaping the Competitive Landscape
PPTX
nagasai stick diagrams in very large scale integratiom.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
introduction about ICD -10 & ICD-11 ppt.pptx
256065457-Anaesthesia-in-Liver-Disease-Patient.ppt
Project English Paja Jara Alejandro.jpdf
“Google Algorithm Updates in 2025 Guide”
KIPER4D situs Exclusive Game dari server Star Gaming Asia
ENCOR_Chapter_11 - ‌BGP implementation.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
WebRTC in SignalWire - troubleshooting media negotiation
QR Codes Qr codecodecodecodecocodedecodecode
KIPER4D situs Exclusive Game dari server Star Gaming Asia
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
KIPER4D situs Exclusive Game dari server Star Gaming Asia
ENCOR_Chapter_10 - OSPFv3 Attribution.pptx
Generative AI Foundations: AI Skills for the Future of Work
Testing WebRTC applications at scale.pdf
5g is Reshaping the Competitive Landscape
nagasai stick diagrams in very large scale integratiom.pptx

Dark Fairytales from a Phisherman

  • 1. Dark  Fairytales  from  a   Phisherman   @an4snatchor  –  HackPra  AllStars  2015  
  • 2. Outline   •  whoami   •  Fishing  ===  Phishing   •  Badass  phishing  at  cost  (almost)  zero   •  Fairytalessss   •  PhishingFrenzy  +  BeEF  FTW   •  Outro  
  • 3. whoami   •  Pentester  &  Vuln  researcher   •  BeEF  lead  core  developer   •  Browser  Hacker’s  Handbook  co-­‐author   •  (ex)  Surf  Cas4ng  pro  fisherman   •  (current)  Phisherman  
  • 5. Fishing  ===  Phishing     (F):  Prepare  bait  and  cast  it   (P):  Prepare  pretext,  phishing  strategy,                  and  send  emails   (F):  Wait  for  something  interested  on  the  bait   (P):  Wait  for  vic4ms  to  click  on  your  links,                               enter  creden4als,  open/execute  stuff   (F):  you  got  a  big  fish   (P):  you  got  a  shell  on  the   company’s  CFO  laptop  
  • 7. •  End-­‐users  are  some4mes  more  stupid  than   saltwater  fishes   – Fishes  do  evolve:  you  have  to  use  smaller  hooks   and  Fluorocarbon  lines  for  increased  stealth   – Humans  apparently  do  not  evolve:  we’re  doing   phishing  with  15  years  old  aZacks  that  s4ll  work   •  MS  Office  macros   •  HTA  files   •  Custom  .exe  files     Fishing  ===  Phishing    
  • 8. Badass  phishing  at  cost  (almost)  zero     •  If  you  do  phishing,  you  know  that:   – Every  4me  it’s  a  different  story   – Configura4on  overhead  some4mes  is  a  killer   – You  can  iden4fy  repeatable  paZerns   – You  need  automa4on   – Speed  is  key  once  you  got  access  to  vic4ms  assets  
  • 9. Badass  phishing  at  cost  (almost)  zero    •  Meet  PhishLulz   – phishing  automa4on  in  Ruby   •  Puts  together  PhishingFrenzy  +  BeEF  on  a   dedicated  Amazon  EC2  image   – Cheers  @zeknox  for  crea4ng  PF  !!!    
  • 10. •  Current  features:   – Mass  mailing  with  HTML  templates  (SET…LOL)   – Highly  configurable  template  system     – HTTP/HTTPS  support   – Creden4al  harves4ng   – BeEF  integra4on     •  Correlate  vic4m  name/email  with  OS/browser   fingerprin4ng  including  geoloca4on   •  Automate  client-­‐side  aZacks  via  BeEF  modules   – Repor4ng   Badass  phishing  at  cost  (almost)  zero    
  • 11. •  What  is  led  to  the  consultant  as  a  manual  step:   – Phishing  domain  selec4on/configura4on  (A/MX/ CNAME  records,  as  well  as  SPF/DKIM  TXT  records)   – Configuring/star4ng  the  phishing  campaign   •  If  an  exis4ng  phishing  template  can  be  used  this  takes  2   minutes   – Eventually  crea4ng/modifying  a  phishing  template   or  client-­‐side  vector   – Wait  for  browser  hooks,  harvested  creden4als  and   shells   Badass  phishing  at  cost  (almost)  zero    
  • 12. Badass  phishing  at  cost  (almost)  zero     •  Amazon  advantages:   – domain/IP  blacklisted?     – Fixed  with  2  steps:   •  Reboot  the  AWS  instance   •  Update  the  A  record  for  your  main  phishing  domain   – Good  IP  block  reputa4on   – Cheap,  zero  maintenance   •  T2.small  -­‐>  0.026$/hours  -­‐>  0.6$/day  -­‐>  3.12  $/5days  
  • 13. Fairytale  1  (s/lulz/real_target_name/)   •  Target:  www.lulz.wa.gov.au  (GMT+8)   – Discovered  during  reconnaissance:   •  Webmail.lulz.com:  Outlook  WebAccess   •  Vpn1.lulz.com:  Checkpoint  SSL  VPN   – OWA  template    (phishing  +  email  pretext)   available  in  PF   – Registered  lulz-­‐wa-­‐gov-­‐au.com  
  • 14. Fairytale  1   •  Started  campaign  with  46  targets  at  13:30  target  4me  
  • 15. Fairytale  1   •  Started  campaign  with  46  targets  at  13:30  target  4me  
  • 16. Fairytale  1   •  In  less  than  3  hours   (by  5PM  COB  in  the   target  4mezone):   39%  success  rate   Harvested  creden4als     Domain  creden4als     VPN  creden4als  
  • 19. Fairytale  1   •  Results:   –  Gov  network  compromised  (including  AD)   –  Pure  blackbox  -­‐>  client-­‐side  -­‐>  internal  pentest   –  Overall  4me  spent:     •  4  hours  prepara4on/recon       •  2  days  harves4ng/pwning   –  Total  cost:     •  About  2  $  for  the  EC2  cost   •  About  8  $  for  the  domain  registra4on   10  $  total  cost    
  • 20. Fairytale  1   •  Results:   –  Gov  network  compromised  (including  AD)   –  Pure  blackbox  -­‐>  client-­‐side  -­‐>  internal  pentest   –  Overall  4me  spent:     •  4  hours  prepara4on/recon       •  2  days  harves4ng/pwning   –  Total  cost:     •  About  2  $  for  the  EC2  cost   •  About  8  $  for  the  domain  registra4on   10  $  total  cost    
  • 21. Badass  phishing  at  cost  (almost)  zero     •  Debian  7  AMI  on  Amazon  EC2   – Can  be  used  with  t2.small  profile  (1  vcore/2GB  ram)   – Loosely  coupled  with  Amazon:  it  can  be  used  with   other  cloud  providers  or  your  own  infrastructure   too   – Relies  on  the  FOG  gem   •  Support  for  Rackspace,  Linode,  Dreamhost,  XenServer,   libvirt,  OpenVZ   •  hZp://fog.io/about/provider_documenta4on.html  
  • 22. Badass  phishing  at  cost  (almost)  zero     •  The  (private)  AMI  has  the  following  installed:   – PhishingFrenzy  (custom  version)   – BeEF   – Apache/MySQL/PostgreSQL   – More  stuff  to  be  added  in  the  (near)  future:     •  metasploit   •  recon-­‐ng   •  Veil   •  URLcrazy  
  • 23. PhishingFrenzy  +  BeEF  FTW     •  PhishLulz  ruby  script  video  demo  
  • 24. PhishingFrenzy  +  BeEF  FTW     •  PhishLulz  phishing  video  demo  
  • 25. Fairytale  2   •  The  Telegraph  UK  asked  us  to  target  a  specific   journalist  (Sept  2014).  Info  provided:   – Name:  Sophie  Cur4s   – Not  much  info  from  reconnaissance   – Target  writes  about  IT  stuff,  breaches,  and  so  on   – Together  with  a  brazilian  friend  of  mine  we  did  the   engagement   •  You  will  not  find  our  names  here:  h"p:// www.telegraph.co.uk/technology/internet-­‐security/ 11153381/How-­‐hackers-­‐took-­‐over-­‐my-­‐computer.html    
  • 26. Fairytale  2   •  AZack  plan:   – Generic  LinkedIn  invite  phishing  campaign   •  Aim:  profile  the  journalist  OS/browser/plugins  with  BeEF   •  Aim  2:  detect  mail  provider/tech   – Ader  fingerprin4ng,  3  client-­‐side  aZacks  op4ons   1.  Custom  encoded  .exe  inside  password  encrypted  .rar   2.  Word  document  with  Powershell  macro   3.  HTA  aZack  targeted  to  Internet  Explorer  
  • 27. Fairytale  2   •  LinkedIn  aZack  (template  in  PF):  
  • 28. Fairytale  2   •  OS,  browser  and  plugin  fingerprint  via  BeEF   – Note:  Office  2012,  Java  1.7u51,  Citrix  ICA  Client  
  • 29. Fairytale  2   •  Credible  Pretext  (snip):  
  • 30. Fairytale  2   •  Credible  Pretext  (snip):  
  • 31. Fairytale  2   •  Via  the  ini4al  fingerprin4ng  we  iden4fied  that   the  vic4m  was  using  Gmail  for  Business   – Encrypted  .zip  is  not  an  op4on,  filename  leak   – “Good”  an4spam/AV   – Phishing  domain  with  SPF/DKIM   – Encrypted  .rar  with  custom  .exe  inside  
  • 32. Fairytale  2   •  Payload:   – .exe  file  with  3  connect-­‐back  mechanisms   •  Reverse  hZps   •  Reverse  DNS   •  OOB  extrusion  via  Outlook  profile   – Custom  encoding   – Adobe  PDF  modified  icon  +  long  Win  filename  trick   – Custom  MsgBox  with  PDF  icon  (msg:  “Adobe  Reader   could  not  open  xxx.pdf”)  
  • 33. Fairytale  2   •  The  vic4m  believed  in  the  pretext,  she  even  replied  back   once  double  clicked  the  payload  asking  for  more  clarifica4on   •  Camera/microphone  access.  Game  over  
  • 34. Fairytale  2   •  Plan-­‐B  was  ready  in  case  of  Plan-­‐A  failure  
  • 35. Fairytale  2   •  Plan-­‐B  was  ready  in  case  of  Plan-­‐A  failure  
  • 36. More  Fairytales?   •  Wait  for  the  new  BeEF  Autorun  Engine   – More  shells,  automated  aZacks   – In  the  mean4me,  if  you  can’t  wait,  enjoy:   •  InsomniHack’14  talk  with  @kkotowicz                                               h"p://www.slideshare.net/micheleorru2/when-­‐you-­‐dont-­‐ have-­‐0days-­‐clientside-­‐exploitaCon-­‐for-­‐the-­‐masses   •  Browser  Hacker’s  Handbook  videos                                                       h"p://browserhacker.com/videos/videos_index.html     •  My  Vimeo  channel  h"ps://vimeo.com/user1924142    
  • 37. PhishingFrenzy  +  BeEF  FTW     •  Work  in  progress   – integra4on  with  UrlCrazy  and  domain  registra4on   providers  for  automa4c  phishing  domain   sugges4on  and  registra4on/configura4on   – Automa4c  campaign  configura4on  based  on   phishing  profiles   •  Outlook  WebAccess   •  LinkedIn   •  HTA/browser  extensions/etc..  
  • 38. PhishingFrenzy  +  BeEF  FTW     •  Work  in  progress   – More  repor4ng  capabili4es  (currently  Excel):   – More  graphs   •  Campaign  4me  graph  with  clicks/submissions  4mestamps   •  Browser  type/version/plugins  and  OS  type  count  
  • 39. PhishingFrenzy  +  BeEF  FTW    •  Work  in  progress   – BeEF  server-­‐side  ARE  (autorun  rule  engine)   – Create  separate  autorun  profiles  for  different   client-­‐side  aZacks  (new  profiles  can  be  added  at   run4me)   •  Internet  explorer  -­‐>  autorun_hta.json   •  Chrome/Firefox  -­‐>  autorun_mal_extension.json   •  Chrome/Firefox  -­‐>  get  WebRTC  internal  IP  address,   start  enumera4ng  internal  network   –  IPC/IPX  (see  my  previous  HackPra  AllStars  presenta4on)   –  Blind  XSRF  on  home  routers,  or  Shellshock  aZacks  on   embedded  Linux  devices  (NAS/routers/cameras/etc..)  
  • 41. PhishingFrenzy  +  BeEF  FTW     …  BTW  That’s  not  the  ISIS  black  flag,  just  BeEF  offline  browsers  …  
  • 42. Outro   Hope  you  enjoyed  the   dark  fairytales!