If you search on the internet or attend pretty much any security conference, you will find a plethora of information on what "phishing" is and how to perform it. As such, this post (and the following ones in the series) will just cover the high points and provide useful references on where you can find more in-depth information.
At its core, phishing is the sending of an email to a target with the intent of having the target perform some action which will lead to the attacker gaining some new piece of information or access.
The statement is a bit vague, and it is meant to be so. That is because phishing can take many forms with many different desired outcomes. The typical outcomes are:
For most phishing exercises/engagements, the following 4 steps will occur:
At its core, phishing is the sending of an email to a target with the intent of having the target perform some action which will lead to the attacker gaining some new piece of information or access.
The statement is a bit vague, and it is meant to be so. That is because phishing can take many forms with many different desired outcomes. The typical outcomes are:
- harvesting credentials from a target, typically via a credential harvesting website
- compromise of the target's web browser via a drive by browser attack or a malicious java payload
- compromise of a target's system typically via a malicious attachment
For most phishing exercises/engagements, the following 4 steps will occur:
- Target identification via
- the customer providing the target list
- the attacker performing Open Source Intelligence Gathering (OSINT)
- One or more websites are designed and made active.
- Two possible site types are:
- credential harvesting
- browser exploit
- The attacker will craft and then send the phishing emails to the target email addresses.
- These emails could be nothing more than a simple template containing a url to one of the previously designed websites, or it could contain a malicious attachment.
- As the exercise/engagement progresses, the attacker will monitor the results and use them to ultimately create a report for the customer.
No comments:
Post a Comment