Red Team Guide: Phishing

Published Apr 6, 2022

Contents


Introduction

If at this point you haven't found any interesting vulnerability you may need to try some phishing in order to get inside the network.

Methodology

  • Recon the victim
    • Select the victim domain.
    • Perform some basic web enumeration searching for login portals used by the victim and decide which one you will impersonate.
    • Use some OSINT to find emails.
  • Prepare the environment
    • Buy the domain you are going to use for the phishing assessment.
    • Configure the email service related records (SPF, DMARC, DKIM, rDNS).
    • Configure the VPS with BeEF.
  • Prepare the campaign
    • Prepare the email template.
    • Prepare the web page to steal the credentials.
  • Launch the campaign!

BeEF

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.