Posts

Showing posts with the label Email

Email Security

Image
Email Spoofing Email header Address displayed: spoof@google.com Received: from emkei.cz Reply-To: spoof@gmail.com Defense Against Email Spoofing Domain-based Message Authentication, Reporting & Conformance (DMARC) DMARC is built based on  SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Message) to verify sender’s identity. SPF performs checking on sender IP addresses of email to verify the IP address is authorized by the domain. You can validate SPF record at proofprint.com . DKIM performs checking on digital signature of email which is generated by MTA (Mail Transfer Agent) to ensure the email is sent and authorized by the owner of the domain. You can validate DKIM record at dmarcanalyzer.com . The diagram below shows how DMARC works. Illustration retrieved from https://www.dmarcanalyzer.com/dmarc/ Summary of multi-layered approach to phishing defences by CPNI Spoofing OpenPGP and S/MIME Signatures ...

Phishing Compilation

Image
Report Phishing Report Phishing to APWG Paypal Case Study: Samsung Galaxy S9 Ads Case Study: Facebook Pixel    Case Study: Winner Maxis  Case Study: Apple  https://gbhackers.com/beware-of-apple-phishing-scam/ Case Study: Apple (2) - Order Receipt  Case Study: Apple (3) - Apple ID locked  Case Study: The Star Case Study: One Drive Case Study: DocuSign Case Study: Facebook Fake pop-up window within webpage Live Demo: https://g4xyk00.github.io/phishing/popup_fb_chrome Fake apps redirection with GIF Case Study: OneNote 21 Feb 2019: More_eggs Backdoor via Fake Job Offers https://www.proofpoint.com/us/threat-insight/post/fake-jobs-campaigns-delivering-moreeggs-backdoor-fake-job-offers 15 Mar 2019: Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing https://www.f...

Social Engineering Testing - Phishing

Image
Update on 20190527 Design Domain Name using CATPHISH or DNSTWIST CATPHISH can be retrieved at  https://github.com/ring0lab/catphish DNSTWIST can be retrieved at  https://github.com/elceef/dnstwist A1. Phishing 1. Build Email Template manually using HTML 2. Include the following HTML code to keep track the action of victim once the victim enable the image to be load while reading the mail <img src="http://<server_ip>/tracker.php?email=<victim_email>"/> 3. Create tracker.php and log.txt in  DocumentRoot (e.g /var/www/html ). 4. Include the following PHP codes inside tracker.php .   <?php date_default_timezone_set ("Asia/Kuala_Lumpur"); $today = date("d-m-Y H:i:s"); if(isset($_GET["email"])){ $logMessage = '['.$today.'] '.$_GET["email"].' read the mail. '; } $filePath = "./log.txt"; $logFile = fopen($filePath,"a+"); fwrite($logFile, ...

Popular posts from this blog

Remote Desktop Protocol (RDP) Security

Penetration Testing - Network

Damn Vulnerable Web Services (DVWS) - Walkthrough

Server Message Block (SMB) Security

Offensive Security Testing Guide

Host Configuration Assessment - Windows

Web Server Hardening - Apache Tomcat

Content Page

Mobile Penetration Testing - Android

Penetration Testing with OWASP Top 10 - 2017 A7 Cross-Site Scripting (XSS)