SlideShare uma empresa Scribd logo
1 de 43
Phishing stories from
the trenches
– Cyber
+ Hacking
$ whoami
Gabor Szathmari
● Incident manager @ Amazon.com
● Security expert @ Iron Bastion
● Privacy advocate @ CryptoAUSTRALIA
We’ll cover
● Why phishing works – examples
● How to get better at offense and
defence
Go
What phishing is
“Only amateurs attack machines; professionals
target people” - Bruce Schneier
● Social engineering
● Not just email
● From simple to sophisticated
Why phishing?
● Steal sensitive stuff:
○ Passwords
○ Payment details (cc numbers, crypto wallets)
● Trick someone into doing something:
○ Reset someone’s password → CIA Director John
Brennan’s AOL account
○ Transfer a phone number → YouTube “h3h3: Your
Privacy is at Risk”
Why phishing? (part 2.)
● Install badware
○ Ransomware, cryptolockers
○ Backdoors, Remote Access Toolkits (RAT)
● The long game
○ Resetting pws of other accounts (DropBox, personal
mailboxes, Steam accounts)
○ Tamper with payment directions
○ Lateral movement into corporate networks
○ Fun
Outdated pieces of advice
Outdated pieces of advice
Outdated pieces of advice
● Hover links
● Check the sender’s email address
● Broken English
● Don’t open files
● Change passwords often
“None of the victims are idiots” - me
Why they don’t work?
Examples
Spot the phish 1.
Spot the phish 2.
Spot the phish 2.
Spot the phish 3.
http://epl.paypal-
communication.com/
T/v40[...]
Spot the phish 3.
Lol:
“As for https://epl.paypal-
communication.com it is clearly also just a
tracker made by PayPal”
https://www.reddit.com/r/paypal/comments/4qlnf0/is_this_a_phishing_attempt/
Spot the phish 4.
Spot the phish 5.
Spot the phish 5.
https://twitter.com/cryptoaustralia/status/905981181048401920
Spot the phish 6.
Enhance! – iPhone
● Sender address
isn’t displayed
● No link hovering
ಠ_ಠ – Lotus Notes
“In Outlook email, I can point the mouse over any hyperlink in email body
and right click and copy the URL that the hyperlink is pointing to.
How do you do this in Lotus Notes email?”
“1. Right click on the email and select ‘Edit’
2. Right click on the link in question and select ‘HotSpot Properties’
3. A new box will pop up that has details about the link
4. Select the text in the ‘Value’ field and Ctrl-C to copy the link address.”
https://superuser.com/questions/836890/how-to-copy-links-in-lotus-notes-email
Plain English
Outdated pieces of advice (recap)
● Hover links – ಠ_ಠ
● Check the sender’s email address – Yeah nah
● Broken English – u w0t m8
● Don’t open files – Good luck with this
● Change passwords often - API creds, application pws
“None of the victims are idiots” - me
Offense and Defence
Disclaimer
● The following offensive
techniques are meant to be
used in penetration testing/
read teaming engagements
● You must have a written
permission from the right
person of the organisation
Phish like a pro
Sender IP reputation:
- DNSBL
- Reverse DNS record (PTR)
Domain reputation:
- Age (> 1 month)
- Old school TLD
(no .horse, .wang, .plumbing)
- Public WHOIS record
- Hosts a website
Phish like pro 2.
Spam/Phishing filter evasion:
- Consistent ‘Envelope sender’, HELO, ‘From’ and domain
- SPF / DKIM / DMARC records
- ‘To: f_name l_name <user@example.com>’
- No web links
- No HTTP redirects
- No link shorteners
- Plain-text
- Avoid suspicious wording
Phish like pro 3.
URL reputation:
- Don’t get blacklisted:
- URIBL.com
- Google Safe Browsing
- Add safe category:
- http://url.fortinet.net/rate/submit.php
- https://www.trustedsource.org/en/feedback/url
- https://global.sitesafety.trendmicro.com/index.php
- https://sitereview.bluecoat.com/
Tooling – Offense 1.
Manage phishing campaigns:
● https://getgophish.com/
● https://github.com/pentestgeek/phishing-frenzy
● https://github.com/securestate/king-phisher
Tooling – Offense
Tooling – Offense 2.
- Generate domains (typosquatting): dnstwist
- Buy abandoned domains: ExpiredDomains.net
- Obfuscate payload
- https://github.com/Veil-Framework/Veil
- Research & pretext
- “Here’s an AWS gift card for using our #hashtag”
- “We’ll send you a survey tomorrow”
How to phish more effectively 101
Tooling – Offense 3.
Improve deliverability:
- Spell check / proofread / peer review emails
- Track bounces and spam complaints (self-hosted)
- https://glockapps.com/bounces-complaints-monitoring/
- Use a transactional email services
- Mailgun, Sendgrid ...
- Buy dedicated IP ($$$)
Tooling – Offense 4.
Build quality email lists:
● DIY – Browser and loads of time
● Pentesting scripts (e.g. theHarvester)
● Pay someone:
○ Search “Lead generation”
○ UpWork.com, Freelancer.com
● Marketing tools to the rescue: Hunter.io, Snov.io
Tooling – Offense 5.
Random words of advice:
● Reduce bounces & complaints:
BriteVerify, emailchecker.io, zerobounce.net
● Spam test: mail-tester.com
● Start slow (warm up with few emails per day)
● Proper salutation + first name
● Add a little variety to each outgoing email
Tooling – Defence 1. – Abuse
Domain monitoring w/ Certificate Transparency:
- https://developers.facebook.com/tools/ct/
- https://phishfinder.io
DMARC record:
- Set to ‘reject’
- Receive forensic reports
- OnDMARC, DMARCian, DMARC Analyzer ($$$)
Tooling – Defence 2. – Email gw
● Neutralise attachments ( .doc → .html )
● Malware sandbox
● URL rewriting
● DNSBL blocklists
● Email quarantine
● URLs: Web proxy or DNS sinkholing (e.g. Pi-hole, Cisco Umbrella)
Services: Mimecast, MailGuard ...
ASD recommendations:
https://www.asd.gov.au/publications/protect/malicious_email_mitigation.htm
Tooling – Defence 3.– Endpoint
● Anti-malware / endpoint protection
○ Anti-phishing filter
○ Ransomware protection
● Browser extensions
○ NoScript, Scriptsafe, Flashblock, uBlock Origin
○ Windows Defender Browser Protection for Chrome
(w00t)
○ Webroot Filtering Extension
Tooling – Defence 4. – Layer 8
● Sandboxing
○ VirtualBox
○ Sandboxie
● Awareness:
○ Phishing simulation: PhishMe, PhishingBox
Summary
● Outdated pieces of advice don’t work
● Phishing comes in different shapes and forms
● High delivery rate can be tedious (but rewarding!)
● Defense in depth is your God
● Professionals target people → Educate them!
Questions?
https://twltter.com/gszathmari
https://www.ironbastion.com.au
gabor@ironbastion.com.au

Mais conteúdo relacionado

Semelhante a Phishing stories from the trenches

Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsKevin Wall
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamOWASP Delhi
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesGabor Szathmari
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...Jason Hong
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Joshua Kamdjou
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityAnne Oikarinen
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a passwordRob Gillen
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Andrew McNicol
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
 

Semelhante a Phishing stories from the trenches (20)

Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security TeamSecrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
Secrets of Google VRP by: Krzysztof Kotowicz, Google Security Team
 
Hacking law firms with abandoned domain names
Hacking law firms with abandoned domain namesHacking law firms with abandoned domain names
Hacking law firms with abandoned domain names
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
 
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
Voight-Kampff for Email Addresses: Quantifying Email Address Reputation to Id...
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 

Mais de Gabor Szathmari

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsiblyGabor Szathmari
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Gabor Szathmari
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopGabor Szathmari
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introductionGabor Szathmari
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for JournalistsGabor Szathmari
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists IntroductionGabor Szathmari
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananasGabor Szathmari
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)Gabor Szathmari
 

Mais de Gabor Szathmari (12)

Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
How to manage your client's data responsibly
How to manage your client's data responsiblyHow to manage your client's data responsibly
How to manage your client's data responsibly
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
CryptoParty Tor Relay Workshop
CryptoParty Tor Relay WorkshopCryptoParty Tor Relay Workshop
CryptoParty Tor Relay Workshop
 
Privacy for journalists introduction
Privacy for journalists introductionPrivacy for journalists introduction
Privacy for journalists introduction
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy for Journalists Introduction
Privacy for Journalists IntroductionPrivacy for Journalists Introduction
Privacy for Journalists Introduction
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
When the CDN goes bananas
When the CDN goes bananasWhen the CDN goes bananas
When the CDN goes bananas
 
PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)PGP and Keybase (CryptoParty Belfast)
PGP and Keybase (CryptoParty Belfast)
 

Último

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Phishing stories from the trenches

  • 1. Phishing stories from the trenches – Cyber + Hacking
  • 2. $ whoami Gabor Szathmari ● Incident manager @ Amazon.com ● Security expert @ Iron Bastion ● Privacy advocate @ CryptoAUSTRALIA
  • 3. We’ll cover ● Why phishing works – examples ● How to get better at offense and defence
  • 4. Go
  • 5. What phishing is “Only amateurs attack machines; professionals target people” - Bruce Schneier ● Social engineering ● Not just email ● From simple to sophisticated
  • 6. Why phishing? ● Steal sensitive stuff: ○ Passwords ○ Payment details (cc numbers, crypto wallets) ● Trick someone into doing something: ○ Reset someone’s password → CIA Director John Brennan’s AOL account ○ Transfer a phone number → YouTube “h3h3: Your Privacy is at Risk”
  • 7. Why phishing? (part 2.) ● Install badware ○ Ransomware, cryptolockers ○ Backdoors, Remote Access Toolkits (RAT) ● The long game ○ Resetting pws of other accounts (DropBox, personal mailboxes, Steam accounts) ○ Tamper with payment directions ○ Lateral movement into corporate networks ○ Fun
  • 10. Outdated pieces of advice ● Hover links ● Check the sender’s email address ● Broken English ● Don’t open files ● Change passwords often “None of the victims are idiots” - me
  • 11. Why they don’t work? Examples
  • 15. Spot the phish 3. http://epl.paypal- communication.com/ T/v40[...]
  • 16. Spot the phish 3. Lol: “As for https://epl.paypal- communication.com it is clearly also just a tracker made by PayPal” https://www.reddit.com/r/paypal/comments/4qlnf0/is_this_a_phishing_attempt/
  • 19. Spot the phish 5. https://twitter.com/cryptoaustralia/status/905981181048401920
  • 21. Enhance! – iPhone ● Sender address isn’t displayed ● No link hovering
  • 22. ಠ_ಠ – Lotus Notes “In Outlook email, I can point the mouse over any hyperlink in email body and right click and copy the URL that the hyperlink is pointing to. How do you do this in Lotus Notes email?” “1. Right click on the email and select ‘Edit’ 2. Right click on the link in question and select ‘HotSpot Properties’ 3. A new box will pop up that has details about the link 4. Select the text in the ‘Value’ field and Ctrl-C to copy the link address.” https://superuser.com/questions/836890/how-to-copy-links-in-lotus-notes-email
  • 24. Outdated pieces of advice (recap) ● Hover links – ಠ_ಠ ● Check the sender’s email address – Yeah nah ● Broken English – u w0t m8 ● Don’t open files – Good luck with this ● Change passwords often - API creds, application pws “None of the victims are idiots” - me
  • 26. Disclaimer ● The following offensive techniques are meant to be used in penetration testing/ read teaming engagements ● You must have a written permission from the right person of the organisation
  • 27. Phish like a pro Sender IP reputation: - DNSBL - Reverse DNS record (PTR) Domain reputation: - Age (> 1 month) - Old school TLD (no .horse, .wang, .plumbing) - Public WHOIS record - Hosts a website
  • 28. Phish like pro 2. Spam/Phishing filter evasion: - Consistent ‘Envelope sender’, HELO, ‘From’ and domain - SPF / DKIM / DMARC records - ‘To: f_name l_name <user@example.com>’ - No web links - No HTTP redirects - No link shorteners - Plain-text - Avoid suspicious wording
  • 29. Phish like pro 3. URL reputation: - Don’t get blacklisted: - URIBL.com - Google Safe Browsing - Add safe category: - http://url.fortinet.net/rate/submit.php - https://www.trustedsource.org/en/feedback/url - https://global.sitesafety.trendmicro.com/index.php - https://sitereview.bluecoat.com/
  • 30. Tooling – Offense 1. Manage phishing campaigns: ● https://getgophish.com/ ● https://github.com/pentestgeek/phishing-frenzy ● https://github.com/securestate/king-phisher
  • 32. Tooling – Offense 2. - Generate domains (typosquatting): dnstwist - Buy abandoned domains: ExpiredDomains.net - Obfuscate payload - https://github.com/Veil-Framework/Veil - Research & pretext - “Here’s an AWS gift card for using our #hashtag” - “We’ll send you a survey tomorrow”
  • 33. How to phish more effectively 101
  • 34. Tooling – Offense 3. Improve deliverability: - Spell check / proofread / peer review emails - Track bounces and spam complaints (self-hosted) - https://glockapps.com/bounces-complaints-monitoring/ - Use a transactional email services - Mailgun, Sendgrid ... - Buy dedicated IP ($$$)
  • 35. Tooling – Offense 4. Build quality email lists: ● DIY – Browser and loads of time ● Pentesting scripts (e.g. theHarvester) ● Pay someone: ○ Search “Lead generation” ○ UpWork.com, Freelancer.com ● Marketing tools to the rescue: Hunter.io, Snov.io
  • 36. Tooling – Offense 5. Random words of advice: ● Reduce bounces & complaints: BriteVerify, emailchecker.io, zerobounce.net ● Spam test: mail-tester.com ● Start slow (warm up with few emails per day) ● Proper salutation + first name ● Add a little variety to each outgoing email
  • 37.
  • 38. Tooling – Defence 1. – Abuse Domain monitoring w/ Certificate Transparency: - https://developers.facebook.com/tools/ct/ - https://phishfinder.io DMARC record: - Set to ‘reject’ - Receive forensic reports - OnDMARC, DMARCian, DMARC Analyzer ($$$)
  • 39. Tooling – Defence 2. – Email gw ● Neutralise attachments ( .doc → .html ) ● Malware sandbox ● URL rewriting ● DNSBL blocklists ● Email quarantine ● URLs: Web proxy or DNS sinkholing (e.g. Pi-hole, Cisco Umbrella) Services: Mimecast, MailGuard ... ASD recommendations: https://www.asd.gov.au/publications/protect/malicious_email_mitigation.htm
  • 40. Tooling – Defence 3.– Endpoint ● Anti-malware / endpoint protection ○ Anti-phishing filter ○ Ransomware protection ● Browser extensions ○ NoScript, Scriptsafe, Flashblock, uBlock Origin ○ Windows Defender Browser Protection for Chrome (w00t) ○ Webroot Filtering Extension
  • 41. Tooling – Defence 4. – Layer 8 ● Sandboxing ○ VirtualBox ○ Sandboxie ● Awareness: ○ Phishing simulation: PhishMe, PhishingBox
  • 42. Summary ● Outdated pieces of advice don’t work ● Phishing comes in different shapes and forms ● High delivery rate can be tedious (but rewarding!) ● Defense in depth is your God ● Professionals target people → Educate them!

Notas do Editor

  1. Works over phone, voicemail, SMS or QR codes Mr. Robot - USB flash drives
  2. Works over phone, voicemail, SMS or QR codes Mr. Robot - USB flash drives
  3. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  4. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  5. Smartphones like iPhone doesn’t display the sender email address Proofreading for $5, pixel perfect copies of Australia Post emails File attachments are a vital part of every business. E.g. resumes, invoices, essays You can’t hover on phone or Lotus Notes Backdoor accounts with API keys or application passwords
  6. Low bounce rate Avoid generic addresses like sales@