SlideShare a Scribd company logo
1 of 21
Download to read offline
Detecting and Preventing Spear
Phishing Attacks Using DNS
Mike Saunders - @hardwaterhacker
mike@hardwatersecurity.com
About Mike
Pen tester with a defender background (purple team!)
17 years in IT
9 years security
The Problem: Typosquatting
What is it?
Intentionally misspelled domain names intended to
imitate legitimate domain names
Why is it bad?
The Problem
Why is it bad?
Often difficult to easily spot
Users may be duped into visiting a malicious site
Motivations
Financial
Advertising revenue on parked domains
Drive traffic to a competitor’s site
Malware delivery
Harvest email from misspelled domains
Phishing attacks
Types of Typosquatting
Repeated
characters
www.google.com www.gooogle.com
Omitted character www.amazon.com www.amzon.com
Charater swap www.defcon.org www.decfon.org
Character insertion www.derbycon.com www.derbycin.com
Missing dots www.microsoft.com wwwmicrosoft.com
Singular/plural www.apple.com www.apples.com
Vowel swapping www.fedex.com www.fadax.com
Types of Typosquatting
Homophones www.route.com www.root.com
Homoglyphs www.derbycon.com www.derbyc0n.com
Wrong TLD www.whitehouse.gov www.whitehouse.com
Misspelling www.arcticcat.com www.articat.com
Different country
code
www.evilcorp.com www.evilcorp.cm
Bit flipping www.facebook.com www.fccebook.com
Real-World Examples
Real-World Examples
Real-World Examples
Real-World Examples
Real-World Examples
Anthem BCBS
wellpoint.com targeted using we11point.com
Premera BCBS
premera.com targeted using prennera.com
More Real-World Examples
carefirst.com targeted with ‘l’ and ‘1’ for ‘i’.
More Real-World Examples
Available Tools
UrlCrazy
Andrew Horton - @urbanadventur3r
http://www.morningstarsecurity.com/research/urlcrazy
dnstwist
Marcin Ulikowski - @elceef
https://github.com/elceef/dnstwist
A Better Way
crazyparser
https://github.com/hardwaterhacker/crazyparser
Detect changes between iterations
Uses both urlcrazy and dnstwist output
Demo Time
Configuration files
Command line options
Output
Preventative Measures
Block in web proxy
Blackhole DNS
Increase monitoring
Proxy logs
email containing links to these domains
Client DNS queries
+ and -
Will find some variations, like we11point.com
prennera.com not originally detected - dnstwist supported - 9/16
careflrst.com detected, caref1st.com wasn’t originally. dnstwist
support added 9/16
+ and -
Will not detect things like service-paypal.com
Does not protect external users / customers
Unless you pursue domain seizure under WIPO UDRP
or US Anticybersquatting Consumer Protection Act
https://www.icann.org/en/system/files/files/guidance-
domain-seizures-07mar12-en.pdf
Questions?
https://github.com/hardwaterhacker/crazyparser
@hardwaterhacker
mike@hardwatersecurity.com
http://hardwatersec.blogspot.com

More Related Content

Viewers also liked

Computer integrated
Computer integratedComputer integrated
Computer integratednirmal304
 
Blog writing by goigi
Blog writing by goigiBlog writing by goigi
Blog writing by goigigoiginivedita
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Publishing House
 
2014 pt3 45_pendidikan islam
2014 pt3 45_pendidikan islam2014 pt3 45_pendidikan islam
2014 pt3 45_pendidikan islamenrique2004
 
Potential of corn husk leaves for the co removal of phenol and cyanide from w...
Potential of corn husk leaves for the co removal of phenol and cyanide from w...Potential of corn husk leaves for the co removal of phenol and cyanide from w...
Potential of corn husk leaves for the co removal of phenol and cyanide from w...eSAT Publishing House
 
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...Mariana Castillo
 

Viewers also liked (7)

Computer integrated
Computer integratedComputer integrated
Computer integrated
 
Blog writing by goigi
Blog writing by goigiBlog writing by goigi
Blog writing by goigi
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
2014 pt3 45_pendidikan islam
2014 pt3 45_pendidikan islam2014 pt3 45_pendidikan islam
2014 pt3 45_pendidikan islam
 
Potential of corn husk leaves for the co removal of phenol and cyanide from w...
Potential of corn husk leaves for the co removal of phenol and cyanide from w...Potential of corn husk leaves for the co removal of phenol and cyanide from w...
Potential of corn husk leaves for the co removal of phenol and cyanide from w...
 
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...
Mariana castillo Herramientas Informaticas Para La Graficacion Y Calculo Mate...
 
CIP Report Deepesh
CIP Report DeepeshCIP Report Deepesh
CIP Report Deepesh
 

More from Mike Saunders

I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101Mike Saunders
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopMike Saunders
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017Mike Saunders
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distroMike Saunders
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-mspMike Saunders
 

More from Mike Saunders (12)

I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshop
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-msp
 

DetectingSpearPhishingAttacks