📘
Hacktricks
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • About the author
  • Getting Started in Hacking
  • Pentesting Methodology
  • External Recon Methodology
  • Phishing Methodology
  • Exfiltration
  • Tunneling and Port Forwarding
  • Brute Force - CheatSheet
  • Search Exploits
  • shells
    • Shells (Linux, Windows, MSFVenom)
  • linux-unix
    • Checklist - Linux Privilege Escalation
    • Linux Privilege Escalation
    • Useful Linux Commands
    • Linux Environment Variables
  • macos
    • MacOS Security & Privilege Escalation
  • windows
    • Checklist - Local Windows Privilege Escalation
    • Windows Local Privilege Escalation
    • Active Directory Methodology
    • NTLM
    • Stealing Credentials
    • Authentication, Credentials, UAC and EFS
    • Basic CMD for Pentesters
    • Basic PowerShell for Pentesters
    • AV Bypass
  • mobile-apps-pentesting
    • Android APK Checklist
    • Android Applications Pentesting
    • iOS Pentesting Checklist
    • iOS Pentesting
  • pentesting
    • Pentesting Network
  • Stargazers
  • blob
    • master
      • hacktricks/LICENSE.md at master
  • network
    • Forks
  • Issues
  • Pull requests
  • Actions
  • Projects
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • Build software better, together
  • Pulse
  • tree
    • Build software better, together
    • GitHub at 1e46f267c2ce5c79bb9a8a146f468f214419f708
    • master
      • .gitbook
        • hacktricks/.gitbook/assets at master
      • hacktricks/.github at master
      • a.i.-exploiting
        • hacktricks/a.i.-exploiting/bra.i.nsmasher-presentation at master
      • hacktricks/backdoors at master
      • hacktricks/blockchain at master
      • hacktricks/cloud-security at master
  • Branches
  • Releases
  • Commits
    • Commits
  • Commits
  • commit
    • GitBook: [master] one page modified@1e46f26
    • GitBook: [master] 3 pages and 6 assets modified@e741d40
    • Update FUNDING.yml@c7e5a37
    • GitBook: [master] one page modified@5b5b28a
    • GitBook: [master] 511 pages and one asset modified@73a4b96
Powered by GitBook
On this page
  • Methodology
  • Generate similar domain names or buy a trusted domain
  • Domain Name Variation Techniques
  • Bitflipping
  • Buy a trusted domain
  • Discovering Emails
  • Configuring GoPhish
  • Installation
  • Configuration
  • Configuring mail server and domain
  • Wait
  • Configure Reverse DNS (rDNS) record
  • Sender Policy Framework (SPF) Record
  • Domain-based Message Authentication, Reporting & Conformance (DMARC) Record
  • DomainKeys Identified Mail (DKIM)
  • Test your email configuration score
  • ​Removing from Spamhouse Blacklist
  • Removing from Microsoft Blacklist
  • Create & Launch GoPhish Campaign
  • Sending Profile
  • Email Template
  • Landing Page
  • Users & Groups
  • Campaign
  • Website Cloning
  • Phishing2.0
  • Detecting the detection
  • References

Was this helpful?

Phishing Methodology

PreviousExternal Recon MethodologyNextExfiltration

Last updated 3 years ago

Was this helpful?

Do you use Hacktricks every day? Did you find the book very useful? Would you like to receive extra help with cybersecurity questions? Would you like to find more and higher quality content on Hacktricks? so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more!

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the ​, or follow me on Twitter ​. If you want to share some tricks with the community you can also submit pull requests to that will be reflected in this book and don't forget to give ⭐ on github to motivate me to continue developing this book.

Methodology

  1. Recon the victim

    1. Select the victim domain.

    2. Perform some basic web enumeration searching for login portals used by the victim and decide which one you will impersonate.

    3. Use some OSINT to find emails.

  2. Prepare the environment

    1. Buy the domain you are going to use for the phishing assessment

    2. Configure the email service related records (SPF, DMARC, DKIM, rDNS)

    3. Configure the VPS with gophish

  3. Prepare the campaign

    1. Prepare the email template

    2. Prepare the web page to steal the credentials

  4. Launch the campaign!

Generate similar domain names or buy a trusted domain

Domain Name Variation Techniques

  • Keyword: The domain name contains an important keyword of the original domain (e.g., zelster.com-management.com).

  • hypened subdomain: Change the dot for a hyphen of a subdomain (e.g., www-zelster.com).

  • New TLD: Same domain using a new TLD (e.g., zelster.org)

  • Homoglyph: It replaces a letter in the domain name with letters that look similar (e.g., zelfser.com).

  • Transposition: It swaps two letters within the domain name (e.g., zelster.com).

  • Singularization/Pluralization: Adds or removes “s” at the end of the domain name (e.g., zeltsers.com).

  • Omission: It removes one of the letters from the domain name (e.g., zelser.com).

  • Repetition: It repeats one of the letters in the domain name (e.g., zeltsser.com).

  • Replacement: Like homoglyph but less stealthy. It replaces one of the letters in the domain name, perhaps with a letter in proximity of the original letter on the keyboard (e.g, zektser.com).

  • Subdomained: Introduce a dot inside the domain name (e.g., ze.lster.com).

  • Insertion: It inserts a letter into the domain name (e.g., zerltser.com).

  • Missing dot: Append the TLD to the domain name. (e.g., zelstercom.com)

Automatic Tools

Websites

Bitflipping

In the world of computing, everything is stored in bits (zeros and ones) in memory behind the scenes. This applies to domains too. For example, windows.com becomes 01110111... in the volatile memory of your computing device. However, what if one of these bits got automatically flipped due to a solar flare, cosmic rays, or a hardware error? That is one of the 0's becomes a 1 and vice versa. Applying this concept to DNS request, it's possible that the domain requested that arrives to the DNS server isn't the same as the domain initially requested.

For example a 1 bit modification in the domain microsoft.com can transform it into windnws.com. Attackers may register as many bit-flipping domains as possible related to the victim in order to redirect legitimate users to their infrastructure.

Buy a trusted domain

Discovering Emails

Configuring GoPhish

Installation

Download and decompress it inside /opt/gophish and execute /opt/gophish/gophish You will be given a password for the admin user in port 3333 in the output. Therefore, access that port and use those credentials to change the admin password. You may need to tunnel that port to local:

ssh -L 3333:127.0.0.1:3333 <user>@<ip>

Configuration

TLS certificate configuration

Before this step you should have already bought the domain you are going to use and it must be pointing to the IP of the VPS where you are configuring gophish.

DOMAIN=""wget https://dl.eff.org/certbot-autochmod +x certbot-autosudo apt install snapdsudo snap install coresudo snap refresh coresudo apt-get remove certbotsudo snap install --classic certbotsudo ln -s /snap/bin/certbot /usr/bin/certbotcertbot certonly --standalone -d "$DOMAIN"mkdir /opt/gophish/ssl_keyscp "/etc/letsencrypt/live/$DOMAIN/privkey.pem" /opt/gophish/ssl_keys/key.pemcp "/etc/letsencrypt/live/$DOMAIN/fullchain.pem" /opt/gophish/ssl_keys/key.crt​

Mail configuration

Start installing: apt-get install postfix

Then add the domain to the following files:

  • /etc/postfix/virtual_domains

  • /etc/postfix/transport

  • /etc/postfix/virtual_regexp

Change also the values of the following variables inside /etc/postfix/main.cf

myhostname = mydestination = $myhostname,, localhost.com, localhost

Finally modify the files /etc/hostname and /etc/mailname to your domain name and restart your VPS.

Now, create a DNS A record of mail. pointing to the ip address of the VPS and a DNS MX record pointing to mail.

Now lets test to send an email:

apt install mailutilsecho "This is the body of the email" | mail -s "This is the subject line" [email protected]

Gophish configuration

Stop the execution of gophish and lets configure it. Modify /opt/gophish/config.json to the following (note the use of https):

{        "admin_server": {                "listen_url": "127.0.0.1:3333",                "use_tls": true,                "cert_path": "gophish_admin.crt",                "key_path": "gophish_admin.key"        },        "phish_server": {                "listen_url": "0.0.0.0:443",                "use_tls": true,                "cert_path": "/opt/gophish/ssl_keys/key.crt",                "key_path": "/opt/gophish/ssl_keys/key.pem"        },        "db_name": "sqlite3",        "db_path": "gophish.db",        "migrations_prefix": "db/db_",        "contact_address": "",        "logging": {                "filename": "",                "level": ""        }}

Configure gophish service

In order to create the gophish service so it can be started automatically and managed a service you can create the file /etc/init.d/gophish with the following content:

#!/bin/bash​​processName=Gophishprocess=gophishappDirectory=/opt/gophishlogfile=/var/log/gophish/gophish.logerrfile=/var/log/gophish/gophish.error​start() {    echo 'Starting '${processName}'...'    cd ${appDirectory}    nohup ./$process >>$logfile 2>>$errfile &    sleep 1}​stop() {    echo 'Stopping '${processName}'...'    pid=$(/bin/pidof ${process})    kill ${pid}    sleep 1 }​status() {    pid=$(/bin/pidof ${process})    if [["$pid" != ""| "$pid" != "" ]]; then        echo ${processName}' is running...'    else        echo ${processName}' is not running...'    fi}​case $1 in    start|stop|status) "$1" ;;esac

Finish configuring the service and checking it doing:

mkdir /var/log/gophishchmod +x /etc/init.d/gophishupdate-rc.d gophish defaultsservice gophish startservice gophish statusss -l | grep "3333\|443"service gophish stop

Configuring mail server and domain

Wait

The older a domain is the less probable it's going to be caught as spam. Then you should wait as much time as possible (at least 1week) before the phishing assessment. Note that even if you have to wait a week you can finish configuring everything now.

Configure Reverse DNS (rDNS) record

Set a rDNS (PTR) record that resolves the IP address of the VPS to the domain name.

Sender Policy Framework (SPF) Record

You must configure a SPF record for the new domain. If you don't know what is a SPF record read the following page:

This is the content that must be set inside a TXT record inside the domain:

v=spf1 mx a ip4:ip.ip.ip.ip ?all

Domain-based Message Authentication, Reporting & Conformance (DMARC) Record

You must configure a DMARC record for the new domain. If you don't know what is a DMARC record read the following page:

You have to create a new DNS TXT record pointing the hostname _dmarc. with the following content:

DomainKeys Identified Mail (DKIM)

You must configure a DKIM for the new domain. If you don't know what is a DMARC record read the following page:

You need to concatenate both B64 values that the DKIM key generates:

v=DKIM1; h=sha256; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0wPibdqPtzYk81njjQCrChIcHzxOp8a1wjbsoNtka2X9QXCZs+iXkvw++QsWDtdYu3q0Ofnr0Yd/TmG/Y2bBGoEgeE+YTUG2aEgw8Xx42NLJq2D1pB2lRQPW4IxefROnXu5HfKSm7dyzML1gZ1U0pR5X4IZCH0wOPhIq326QjxJZm79E1nTh3xj" "Y9N/Dt3+fVnIbMupzXE216TdFuifKM6Tl6O/axNsbswMS1TH812euno8xRpsdXJzFlB9q3VbMkVWig4P538mHolGzudEBg563vv66U8D7uuzGYxYT4WS8NVm3QBMg0QKPWZaKp+bADLkOSB9J2nUpk4Aj9KB5swIDAQAB

Test your email configuration score

echo "This is the body of the email" | mail -s "This is the subject line" [email protected]
==========================================================Summary of Results==========================================================SPF check:          passDomainKeys check:   neutralDKIM check:         passSender-ID check:    passSpamAssassin check: ham

Alternatively, you can send a message to a Gmail address that you control, view the received email’s headers in your Gmail inbox, dkim=pass should be present in the Authentication-Results header field.

Authentication-Results: mx.google.com;

​Removing from Spamhouse Blacklist

Removing from Microsoft Blacklist

Create & Launch GoPhish Campaign

Sending Profile

  • Set some name to identify the sender profile

  • Decide from which account are you going to send the phishing emails. Suggestions: noreply, support, servicedesk, salesforce...

  • You can leave blank the username and password, but make sure to check the Ignore Certificate Errors

It's recommended to use the "Send Test Email" functionality to test that everything is working. I would recommend to send the test emails to 10min mails addresses in order to avoid getting blacklisted making tests.

Email Template

  • Set some name to identify the template

  • Then write a subject (nothing estrange, just something you could expect to read in a regular email)

  • Make sure you have checked "Add Tracking Image"

  • Write the email template (you can use variables like in the following example):

<html><head>    <title>title>head><body><p class="MsoNormal"><span style="font-size:10.0pt;font-family:";Verdana";,sans-serif;color:black">Dear {{.FirstName}} {{.LastName}},span>p>​<p class="MsoNormal"><span style="font-size:10.0pt;font-family:";Verdana";,sans-serif;color:black">As you may be aware, due to the large number of employees working from home, the "PLATFORM NAME" platform is being migrated to a new domain with an improved and more secure version. To finalize account migration, please use the following link to log into the new HR portal and move your account to the new site: <a href="{{.URL}}"> "PLATFORM NAME" login portal a><br /><br />Please Note: We require all users to move their accounts by 04/01/2021. Failure to confirm account migration may prevent you from logging into the application after the migration process is complete.<br /><br />Regards,span>p>​WRITE HERE SOME SIGNATURE OF SOMEONE FROM THE COMPANY​<p>{{.Tracker}}p>body>html>

Note that in order to increase the credibility of the email, it's recommended to use some signature from an email from the client. Suggestions:

  • Send an email to a non existent address and check if the response has any signature.

  • Try to contact some valid discovered email and wait for the response

Landing Page

  • Write a name

  • Write the HTML code of the web page. Note that you can import web pages.

  • Mark Capture Submitted Data and Capture Passwords

  • Set a redirection

Usually you will need to modify the HTML code of the page and make some tests in local (maybe using some Apache server) until you like the results. Then, write that HTML code in the box. Note that if you need to use some static resources for the HTML (maybe some CSS and JS pages) you can save them in /opt/gophish/static/endpoint and then access them from /static/

Users & Groups

  • Set a name

  • Import the data (note that in order to use the template for the example you need the firstname, last name and email address of each user)

Campaign

Finally, create a campaign selecting a name, the email template, the landing page, the URL, the sending profile and the group. Note that the URL will be the link sent to the victims

Note that the Sending Profile allow to send a test email to see how will the final phishing email looks like:

I would recommend to send the test emails to 10min mails addresses in order to avoid getting blacklisted making tests.

Once everything is ready, just launch the campaign!

Website Cloning

If for any reason you want to clone the website check the following page:

Phishing2.0

The previous attack is pretty clever as you are faking a real website and gathering the information set by the user. Unfortunately, if the user didn't put the correct password or if the application you faked is configured with 2FA, this information won't allow you to impersonate the tricked user.

  1. You impersonate the login form of the real webpage.

  2. The user send his credentials to your fake page and the tool send those to the real webpage, checking if the credentials work.

  3. If the account is configured with 2FA, the MitM page will ask for it and once the user introduces it the tool will send it to the real web page.

  4. Once the user is authenticated you (as attacker) will have captured the credentials, the 2FA, the cookie and any information of every interaction your while the tool is performing a MitM.

Detecting the detection

However, there are other ways to know if the victim is actively looking for suspicions phishing activity in the wild as explained in:

You can buy a domain with a very similar name to the victims domain and/or generate a certificate for a subdomain of a domain controlled by you containing the keyword of the victim's domain. If the victim perform any kind of DNS or HTTP interaction with them, you will know that he is actively looking for suspicious domains and you will need to be very stealth.

References

For more information read ​

You can search in for a expired domain that you could use. In order to make sure that the expired domain that you are going to buy has already a good SEO you could search how is it categorized in:

In order to discover more valid email addresses or verify the ones you have already discovered you can check if you can brute-force them smtp servers of the victim. . Moreover, don't forget that if the users use any web portal to access their mails, you can check if it's vulnerable to username brute force, and exploit the vulnerability if possible.

You can download it from ​

You can use to generate your SPF policy (use the IP of the VPS machine)

This tutorial is based on: ​

You can do that using Just access the page and send an email to the address they give you:

You can also check your email configuration sending an email to and reading the response (for this you will need to open port 25 and see the response in the file /var/mail/root if you send the email a as root). Check that you pass all the tests:

The page www.mail-tester.com can indicate you if you your domain is being blocked by spamhouse. You can request your domain/IP to be removed at: ​​

​​You can request your domain/IP to be removed at .

Search for public emails like or or and send them an email and wait for the response.

The Email Template also allows to attach files to send. If you would also like to steal NTLM challenges using some specially crafted files/documents .

For the redirection you could redirect the users to the legit main web page of the victim, or redirect them to /static/migration.html for example, put some spinning wheel () for 5 seconds and then indicate that the process was successful.

This is where tools like are useful. This tool will allow you to generate a MitM like attack. Basically, the attacks works in the following way:

Obviously one of the best ways to know if you have been busted is to search your domain inside blacklists. If it appears listed, somehow your domain was detected as suspicions. One easy way to check if you domain appears in any blacklist is to use ​

Support Hacktricks through github sponsors
💬
telegram group
🐦
@carlospolopm
https://github.com/carlospolop/hacktricks
https://www.bleepingcomputer.com/news/security/hijacking-traffic-to-microsoft-s-windowscom-with-bitflipping/
https://www.expireddomains.net/
Learn how to verify/discover email address here
https://github.com/gophish/gophish/releases/tag/v0.11.0
https://www.spfwizard.net/
https://www.digitalocean.com/community/tutorials/how-to-install-and-configure-dkim-with-postfix-on-debian-wheezy
https://www.mail-tester.com/
[email protected]
https://www.spamhaus.org/lookup/
https://sender.office.com/
[email protected]
[email protected]
[email protected]
read this page
https://loading.io/
evilginx2
https://malwareworld.com/