SlideShare a Scribd company logo
1 of 22
Download to read offline
LET’S SPREAD PHISHING AND
ESCAPE THE BLOCKLISTS
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Tecniche sfruttate dai criminali per protrarre una campagna di phishing
Photo by Nahel Abdul Hadi on Unsplash
WHOAMI
+ Phishing Analysis and Contrast @ D3Lab
+ Python Developer
Matteo Flora
+ Team Member @ BackBox Linux
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Andrea Draghetti
Il Phishing è un tipo di truffa effettuata su Internet attraverso la
quale un malintenzionato cerca di ingannare la vittima
convincendola a fornire informazioni personali, dati finanziari o
codici di accesso, fingendosi un ente affidabile in una
comunicazione digitale.

{Wikipedia}
PHISHING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
400000
800000
1200000
1600000
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Number of unique phishing e-mail reports
Number of unique phishing web sites
Fonte: Anti-Phishing Working Group
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
Countries targeted by malicious mailings

Fonte: Securelist
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
Rating of categories of organizations attacked by phishers

Fonte: Securelist
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
VETTORI: EMAIL, SMISHING, VISHING, ADS, ETC..
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
CONTRASTO
Blocklist Abuse Team
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
CONTRASTO: BLOCKLIST
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
https://safebrowsing.google.com/safebrowsing/report_phish/
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
BLOCKLIST E TECNICHE DI EVASIONE: GEO-BLOCKING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
	<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script>
	<script>
		 $.getJSON('https://api.ip.sb/geoip?callback=?', function (data) {
		 	 if (data.continent_code == "EU"){
		 	 	 $(location).attr('href', ‘http://example.xsph.ru/phishing-page/')}
		 	 else {
		 	 	 $(location).attr('href', ‘https://google.it/')}
		 });
	</script>
BLOCKLIST E TECNICHE DI EVASIONE: IP-BLOCKING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
$ip_blocking_array = ["^192.168.*.*"]
foreach ($ip_blocking_array as $ip) {
if (preg_match("/" . $ip . "/", $ipaddress_visitor)) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
}
BLOCKLIST E TECNICHE DI EVASIONE: HOSTNAME BLOCKING
$blocked_hostname = array( "google", "phishtank", “netcraft", "yandex", ...);
foreach($blocked_hostname as $word) {
if (substr_count(gethostbyaddr($_SERVER['REMOTE_ADDR']), $word) > 0) {
		 header("HTTP/1.0 404 Not Found");
	die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING
$useragent = $_SERVER['HTTP_USER_AGENT'];

if (strpos($useragent, "google") OR strpos($useragent, "phishtank") !== false ) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING
$useragent = $_SERVER['HTTP_USER_AGENT'];
if (strstr($useragent, "iPhone") === false ) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: RANDOM PATHS
https://www.officialsite.it.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/

https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/ 



https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
ANTI-SPAM E TECNICHE DI EVASIONE
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
mail-tester.com
ANTI-SPAM E TECNICHE DI EVASIONE
Invisible characters:



<style>span.hc {font-size:0;}</style>

P<span class='hc'>1</span>a<span class='hc'>2</
span>y<span class='hc'>3</span>P<span
class='hc'>4</span>a<span class='hc'>5</
span>l<span class=‘hc’>6</span>…..

Allowed URL:


https://bit.ly/2WwFPyB
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
DEMO
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
https://github.com/drego85/HackInBoSafeEdition/
CONCLUSIONE
Photo by NeONBRAND on Unsplash

More Related Content

Similar to Let’s spread Phishing and escape the blocklists

Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing AttackJune Park
 
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystCOVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystRadu Vunvulea
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} Dimitar Danailov
 
Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureAndrea Draghetti
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondLucidworks
 
Automate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenAutomate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenKiran Panesar
 
PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!Blanca Mancilla
 
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266iMasters
 
InterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuInterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuiMasters
 
Nuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitNuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitGreta Strolyte
 
Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Dustin Haisler
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Ontico
 

Similar to Let’s spread Phishing and escape the blocklists (20)

Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystCOVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalyst
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03}
 
Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisure
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
SunShine PHP
SunShine PHPSunShine PHP
SunShine PHP
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and Beyond
 
Automate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenAutomate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and Schezhen
 
PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!
 
The Red Hat Way
The Red Hat WayThe Red Hat Way
The Red Hat Way
 
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
 
InterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuInterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em Ethereu
 
Croosing
Croosing Croosing
Croosing
 
Nuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitNuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summit
 
Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
 
Meteor WWNRW Intro
Meteor WWNRW IntroMeteor WWNRW Intro
Meteor WWNRW Intro
 

More from Andrea Draghetti

Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzioneAndrea Draghetti
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingAndrea Draghetti
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Andrea Draghetti
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneAndrea Draghetti
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaAndrea Draghetti
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariAndrea Draghetti
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoAndrea Draghetti
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableAndrea Draghetti
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many VictimsAndrea Draghetti
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisureAndrea Draghetti
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Andrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFAndrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestAndrea Draghetti
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...Andrea Draghetti
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockAndrea Draghetti
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!Andrea Draghetti
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!Andrea Draghetti
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiAndrea Draghetti
 

More from Andrea Draghetti (18)

Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzione
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishing
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusione
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e Sicurezza
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativo
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e Metasploitable
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many Victims
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e Contromisure
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTF
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
 

Recently uploaded

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 

Recently uploaded (20)

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Let’s spread Phishing and escape the blocklists

  • 1. LET’S SPREAD PHISHING AND ESCAPE THE BLOCKLISTS H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Tecniche sfruttate dai criminali per protrarre una campagna di phishing Photo by Nahel Abdul Hadi on Unsplash
  • 2. WHOAMI + Phishing Analysis and Contrast @ D3Lab + Python Developer Matteo Flora + Team Member @ BackBox Linux H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Andrea Draghetti
  • 3. Il Phishing è un tipo di truffa effettuata su Internet attraverso la quale un malintenzionato cerca di ingannare la vittima convincendola a fornire informazioni personali, dati finanziari o codici di accesso, fingendosi un ente affidabile in una comunicazione digitale. {Wikipedia} PHISHING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 4. STATISTICHE 400000 800000 1200000 1600000 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 Number of unique phishing e-mail reports Number of unique phishing web sites Fonte: Anti-Phishing Working Group H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 5. STATISTICHE Countries targeted by malicious mailings Fonte: Securelist H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 6. STATISTICHE Rating of categories of organizations attacked by phishers Fonte: Securelist H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 7. VETTORI: EMAIL, SMISHING, VISHING, ADS, ETC.. H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 8. CONTRASTO Blocklist Abuse Team H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 9. CONTRASTO: BLOCKLIST H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 10. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I https://safebrowsing.google.com/safebrowsing/report_phish/
  • 11. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 12. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 13. BLOCKLIST E TECNICHE DI EVASIONE: GEO-BLOCKING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script> <script> $.getJSON('https://api.ip.sb/geoip?callback=?', function (data) { if (data.continent_code == "EU"){ $(location).attr('href', ‘http://example.xsph.ru/phishing-page/')} else { $(location).attr('href', ‘https://google.it/')} }); </script>
  • 14. BLOCKLIST E TECNICHE DI EVASIONE: IP-BLOCKING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I $ip_blocking_array = ["^192.168.*.*"] foreach ($ip_blocking_array as $ip) { if (preg_match("/" . $ip . "/", $ipaddress_visitor)) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } }
  • 15. BLOCKLIST E TECNICHE DI EVASIONE: HOSTNAME BLOCKING $blocked_hostname = array( "google", "phishtank", “netcraft", "yandex", ...); foreach($blocked_hostname as $word) { if (substr_count(gethostbyaddr($_SERVER['REMOTE_ADDR']), $word) > 0) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 16. BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING $useragent = $_SERVER['HTTP_USER_AGENT'];
 if (strpos($useragent, "google") OR strpos($useragent, "phishtank") !== false ) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 17. BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING $useragent = $_SERVER['HTTP_USER_AGENT']; if (strstr($useragent, "iPhone") === false ) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 18. BLOCKLIST E TECNICHE DI EVASIONE: RANDOM PATHS https://www.officialsite.it.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/ https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/ 
 
 https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/ H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 19. ANTI-SPAM E TECNICHE DI EVASIONE H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I mail-tester.com
  • 20. ANTI-SPAM E TECNICHE DI EVASIONE Invisible characters:
 
 <style>span.hc {font-size:0;}</style> P<span class='hc'>1</span>a<span class='hc'>2</ span>y<span class='hc'>3</span>P<span class='hc'>4</span>a<span class='hc'>5</ span>l<span class=‘hc’>6</span>….. Allowed URL: 
 https://bit.ly/2WwFPyB H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 21. DEMO H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I https://github.com/drego85/HackInBoSafeEdition/