Author Topic: 2014 Phishing (new Methods?)  (Read 5696 times)

0 Members and 2 Guests are viewing this topic.

Offline l0n3r

  • Serf
  • *
  • Posts: 23
  • Cookies: -16
    • View Profile
2014 Phishing (new Methods?)
« on: January 29, 2014, 07:47:00 pm »
This article just came about about 3 days ago, talking about Microsoft getting breached, supposedly via a spear phishing campaign, compromising the email accounts and social media accounts of Microsoft employees.

Article: http://securityaffairs.co/wordpress/21622/cyber-crime/spear-phishing-against-microsoft.html

My questions is regarding modern day phishing techniques. From my understanding, two/four years ago it was totally possible to do the standard:

1) copy web page
2) write credential grabbing php
3) upload to free web host
4) craft email
5) breach (capture credentials)

This sounds vague but I hope you guys get the point. The old ways of making phishing email is what im referring to, I think there is a post somewhere on here regarding what I was talking about.

But in 2013-2014, that isnt gonna fly obviously. Your more than likely to land a nice spot in the spam or junk box. My questions is what are some modern techniques in crafting these emails that are working these days?

Ive been reading that people would compromise a website/server, redirect victim to compromised server, and feed drive-by attacks to passerbys. And then there are stored xss (fairly rare now) breaches and CSRF attacks,etc. But without sounding to eager, but what are the BH tactics. As a penetration tester, I need to replicate and simulate a BH attack in ways. And phishing emails are crucial in attacks, but not dated attacks. My job currently audit website security. But I wanna expand to replicating APT attacks and leveraging user ignorance on my engagements. Just alot of the public info is dated....

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: 2014 Phishing (new Methods?)
« Reply #1 on: January 29, 2014, 08:00:41 pm »
I believe kali has a suite for it, but the name escapes me
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: 2014 Phishing (new Methods?)
« Reply #2 on: January 29, 2014, 08:53:08 pm »
I believe kali has a suite for it, but the name escapes me
SET (Social Engineering Toolkit). Never used it though.

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: 2014 Phishing (new Methods?)
« Reply #3 on: January 29, 2014, 09:02:34 pm »
SET (Social Engineering Toolkit). Never used it though.

That be the one. I experimented if for a little while.

https://www.trustedsec.com/downloads/social-engineer-toolkit/

tut on using SET phishing:
http://www.lokisec.com/?p=366
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline l0n3r

  • Serf
  • *
  • Posts: 23
  • Cookies: -16
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #4 on: January 29, 2014, 10:01:03 pm »
Ah thanks guys! I'm familiar with it, but for sure I will look deeper into the kit. thanks again

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: 2014 Phishing (new Methods?)
« Reply #5 on: January 30, 2014, 12:03:30 am »
SET is a great tool, copy a login page on the fly in conjunction with DNS spoofing, you dont need to send any email, just wait for them to type the url.
« Last Edit: January 30, 2014, 12:05:47 am by b0whunter »
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline jahuh

  • Banned leecher
  • /dev/null
  • *
  • Posts: 5
  • Cookies: -11
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #6 on: February 03, 2014, 09:28:56 pm »
dead/boring  forum.

Offline b0whunter

  • Serf
  • *
  • Posts: 41
  • Cookies: 11
  • The finest sword plunged into salt water will rust
    • View Profile
    • My journal
Re: 2014 Phishing (new Methods?)
« Reply #7 on: February 04, 2014, 02:19:33 am »
dead/boring  forum.


This forum is rather like an interactive library. There' new content, questions, discussions, etc. Most importantly, as you probably noticed, the irrelevant stuff gets thrown out.
“Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.”
― Sun Tzu, The Art of War

Offline jahuh

  • Banned leecher
  • /dev/null
  • *
  • Posts: 5
  • Cookies: -11
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #8 on: February 04, 2014, 02:06:34 pm »
still boring/dead..  they ignore pples questions and request to help on tutorials.. i believe other hacking forums are better.. i miss devilzone.net hope they'll come back soon or create a new site.. this forum is dead!!!!

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #9 on: February 04, 2014, 02:09:23 pm »
still boring/dead..  they ignore pples questions and request to help on tutorials.. i believe other hacking forums are better.. i miss devilzone.net hope they'll come back soon or create a new site.. this forum is dead!!!!
Just get the fuck out if you want spoonfeeding, wrong board kid.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline nafuti

  • Serf
  • *
  • Posts: 43
  • Cookies: 11
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #10 on: February 04, 2014, 04:33:07 pm »
still boring/dead..  they ignore pples questions and request to help on tutorials.. i believe other hacking forums are better.. i miss devilzone.net hope they'll come back soon or create a new site.. this forum is dead!!!!
Think he is claiming he knew the old EZ. If you have been around that long dude then you most notably should have had your knowledge base flowing. But if you are still at the level of asking for tutorials and probably hack this site for me, then you are no better than the complete NOOB i am.


I suggest you tuck your tail between your legs and run to your master or settle in, flow with the wave and you will discover the secret chamber of secrets. I am trying to do just that.

Offline hppd

  • Knight
  • **
  • Posts: 163
  • Cookies: 7
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #11 on: February 04, 2014, 05:23:06 pm »
still boring/dead..  they ignore pples questions and request to help on tutorials.. i believe other hacking forums are better.. i miss devilzone.net hope they'll come back soon or create a new site.. this forum is dead!!!!
Haha mister
Quote from: jahuh
where do i buy a botnet and tutorials on how to use it for newbie??

What do you mean with dead? Ez has really valuable info.. If you wanna be a botmaster go on TF if you want people to spoonfeed you go on HF..

Cheers 8)


SET is a great tool, copy a login page on the fly in conjunction with DNS spoofing, you dont need to send any email, just wait for them to type the url.

How do you spoof the dns on someone else's lan?
 
« Last Edit: February 04, 2014, 05:26:52 pm by hppd »

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #12 on: February 04, 2014, 07:29:55 pm »
Haha mister
What do you mean with dead? Ez has really valuable info.. If you wanna be a botmaster go on TF if you want people to spoonfeed you go on HF..

Cheers 8)


How do you spoof the dns on someone else's lan?

Its not just spoofing, basically its a race between the true DNS server on the network and you, whoever comes first.
Otherwise you would have to gain a mitm position in one way or another, plenty options there.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline hppd

  • Knight
  • **
  • Posts: 163
  • Cookies: 7
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #13 on: February 04, 2014, 10:16:53 pm »
But don't you have to be on their network somehow?? I can't imagine how you would do it otherwise  :P

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: 2014 Phishing (new Methods?)
« Reply #14 on: February 05, 2014, 06:05:34 am »
But don't you have to be on their network somehow?? I can't imagine how you would do it otherwise  :P
Makes it a hell of a lot easier.
But one could still somehow effect his dns configuration, viral or by weak passwords of modems and that kinda stuff, than alter the DNS config and point it to your own DNS server.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage