SlideShare a Scribd company logo
1 of 22
Download to read offline
LET’S SPREAD PHISHING AND
ESCAPE THE BLOCKLISTS
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Tecniche sfruttate dai criminali per protrarre una campagna di phishing
Photo by Nahel Abdul Hadi on Unsplash
WHOAMI
+ Phishing Analysis and Contrast @ D3Lab
+ Python Developer
Matteo Flora
+ Team Member @ BackBox Linux
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Andrea Draghetti
Il Phishing è un tipo di truffa effettuata su Internet attraverso la
quale un malintenzionato cerca di ingannare la vittima
convincendola a fornire informazioni personali, dati finanziari o
codici di accesso, fingendosi un ente affidabile in una
comunicazione digitale.

{Wikipedia}
PHISHING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
400000
800000
1200000
1600000
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Number of unique phishing e-mail reports
Number of unique phishing web sites
Fonte: Anti-Phishing Working Group
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
Countries targeted by malicious mailings

Fonte: Securelist
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
STATISTICHE
Rating of categories of organizations attacked by phishers

Fonte: Securelist
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
VETTORI: EMAIL, SMISHING, VISHING, ADS, ETC..
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
CONTRASTO
Blocklist Abuse Team
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
CONTRASTO: BLOCKLIST
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
https://safebrowsing.google.com/safebrowsing/report_phish/
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
CONTRASTO: GOOGLE SAFE BROWSING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
BLOCKLIST E TECNICHE DI EVASIONE: GEO-BLOCKING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
	<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script>
	<script>
		 $.getJSON('https://api.ip.sb/geoip?callback=?', function (data) {
		 	 if (data.continent_code == "EU"){
		 	 	 $(location).attr('href', ‘http://example.xsph.ru/phishing-page/')}
		 	 else {
		 	 	 $(location).attr('href', ‘https://google.it/')}
		 });
	</script>
BLOCKLIST E TECNICHE DI EVASIONE: IP-BLOCKING
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
$ip_blocking_array = ["^192.168.*.*"]
foreach ($ip_blocking_array as $ip) {
if (preg_match("/" . $ip . "/", $ipaddress_visitor)) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
}
BLOCKLIST E TECNICHE DI EVASIONE: HOSTNAME BLOCKING
$blocked_hostname = array( "google", "phishtank", “netcraft", "yandex", ...);
foreach($blocked_hostname as $word) {
if (substr_count(gethostbyaddr($_SERVER['REMOTE_ADDR']), $word) > 0) {
		 header("HTTP/1.0 404 Not Found");
	die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING
$useragent = $_SERVER['HTTP_USER_AGENT'];

if (strpos($useragent, "google") OR strpos($useragent, "phishtank") !== false ) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING
$useragent = $_SERVER['HTTP_USER_AGENT'];
if (strstr($useragent, "iPhone") === false ) {
header("HTTP/1.0 404 Not Found");
die("<h1>404 Not Found</h1>The page that you have requested could not be found.");
}
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
BLOCKLIST E TECNICHE DI EVASIONE: RANDOM PATHS
https://www.officialsite.it.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/

https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/ 



https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
ANTI-SPAM E TECNICHE DI EVASIONE
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
mail-tester.com
ANTI-SPAM E TECNICHE DI EVASIONE
Invisible characters:



<style>span.hc {font-size:0;}</style>

P<span class='hc'>1</span>a<span class='hc'>2</
span>y<span class='hc'>3</span>P<span
class='hc'>4</span>a<span class='hc'>5</
span>l<span class=‘hc’>6</span>…..

Allowed URL:


https://bit.ly/2WwFPyB
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
DEMO
H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
https://github.com/drego85/HackInBoSafeEdition/
CONCLUSIONE
Photo by NeONBRAND on Unsplash

More Related Content

Similar to Let’s spread Phishing and escape the blocklists

Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing AttackJune Park
 
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystCOVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystRadu Vunvulea
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} Dimitar Danailov
 
Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureAndrea Draghetti
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondLucidworks
 
Automate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenAutomate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenKiran Panesar
 
PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!Blanca Mancilla
 
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266iMasters
 
InterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuInterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuiMasters
 
Nuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitNuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitGreta Strolyte
 
Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Dustin Haisler
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Ontico
 

Similar to Let’s spread Phishing and escape the blocklists (20)

Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystCOVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalyst
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03}
 
Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisure
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
SunShine PHP
SunShine PHPSunShine PHP
SunShine PHP
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and Beyond
 
Automate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and SchezhenAutomate iOS Deployment with Hamper and Schezhen
Automate iOS Deployment with Hamper and Schezhen
 
PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!PyLadies Talk: Learn to love the command line!
PyLadies Talk: Learn to love the command line!
 
The Red Hat Way
The Red Hat WayThe Red Hat Way
The Red Hat Way
 
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
InterCon 2016 - Internet of “Thinking” – IoT sem BS com ESP8266
 
InterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em EthereuInterCon 2016 - Blockchain e smart-contracts em Ethereu
InterCon 2016 - Blockchain e smart-contracts em Ethereu
 
Croosing
Croosing Croosing
Croosing
 
Nuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summitNuno Job - what's next for software - ANDdigital tech summit
Nuno Job - what's next for software - ANDdigital tech summit
 
Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...Disruptive Innovations and Local Government Strategies for Embracing these In...
Disruptive Innovations and Local Government Strategies for Embracing these In...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
Climbing out from the digital mud with unikernels / Ian Eyberg (DeferPanic)
 
Meteor WWNRW Intro
Meteor WWNRW IntroMeteor WWNRW Intro
Meteor WWNRW Intro
 

More from Andrea Draghetti

Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzioneAndrea Draghetti
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingAndrea Draghetti
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Andrea Draghetti
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneAndrea Draghetti
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaAndrea Draghetti
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariAndrea Draghetti
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoAndrea Draghetti
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableAndrea Draghetti
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many VictimsAndrea Draghetti
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisureAndrea Draghetti
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Andrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFAndrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestAndrea Draghetti
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...Andrea Draghetti
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockAndrea Draghetti
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!Andrea Draghetti
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!Andrea Draghetti
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiAndrea Draghetti
 

More from Andrea Draghetti (18)

Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzione
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishing
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusione
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e Sicurezza
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativo
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e Metasploitable
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many Victims
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e Contromisure
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTF
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
 

Recently uploaded

Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Recently uploaded (20)

Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Let’s spread Phishing and escape the blocklists

  • 1. LET’S SPREAD PHISHING AND ESCAPE THE BLOCKLISTS H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Tecniche sfruttate dai criminali per protrarre una campagna di phishing Photo by Nahel Abdul Hadi on Unsplash
  • 2. WHOAMI + Phishing Analysis and Contrast @ D3Lab + Python Developer Matteo Flora + Team Member @ BackBox Linux H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Andrea Draghetti
  • 3. Il Phishing è un tipo di truffa effettuata su Internet attraverso la quale un malintenzionato cerca di ingannare la vittima convincendola a fornire informazioni personali, dati finanziari o codici di accesso, fingendosi un ente affidabile in una comunicazione digitale. {Wikipedia} PHISHING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 4. STATISTICHE 400000 800000 1200000 1600000 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 Number of unique phishing e-mail reports Number of unique phishing web sites Fonte: Anti-Phishing Working Group H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 5. STATISTICHE Countries targeted by malicious mailings Fonte: Securelist H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 6. STATISTICHE Rating of categories of organizations attacked by phishers Fonte: Securelist H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 7. VETTORI: EMAIL, SMISHING, VISHING, ADS, ETC.. H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 8. CONTRASTO Blocklist Abuse Team H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 9. CONTRASTO: BLOCKLIST H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 10. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I https://safebrowsing.google.com/safebrowsing/report_phish/
  • 11. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 12. CONTRASTO: GOOGLE SAFE BROWSING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I Fonte: https://www.inrialpes.fr/planete/people/amkumar/papers/gsb-security.pdf
  • 13. BLOCKLIST E TECNICHE DI EVASIONE: GEO-BLOCKING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js"></script> <script> $.getJSON('https://api.ip.sb/geoip?callback=?', function (data) { if (data.continent_code == "EU"){ $(location).attr('href', ‘http://example.xsph.ru/phishing-page/')} else { $(location).attr('href', ‘https://google.it/')} }); </script>
  • 14. BLOCKLIST E TECNICHE DI EVASIONE: IP-BLOCKING H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I $ip_blocking_array = ["^192.168.*.*"] foreach ($ip_blocking_array as $ip) { if (preg_match("/" . $ip . "/", $ipaddress_visitor)) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } }
  • 15. BLOCKLIST E TECNICHE DI EVASIONE: HOSTNAME BLOCKING $blocked_hostname = array( "google", "phishtank", “netcraft", "yandex", ...); foreach($blocked_hostname as $word) { if (substr_count(gethostbyaddr($_SERVER['REMOTE_ADDR']), $word) > 0) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 16. BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING $useragent = $_SERVER['HTTP_USER_AGENT'];
 if (strpos($useragent, "google") OR strpos($useragent, "phishtank") !== false ) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 17. BLOCKLIST E TECNICHE DI EVASIONE: USER-AGENT BLOCKING $useragent = $_SERVER['HTTP_USER_AGENT']; if (strstr($useragent, "iPhone") === false ) { header("HTTP/1.0 404 Not Found"); die("<h1>404 Not Found</h1>The page that you have requested could not be found."); } H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 18. BLOCKLIST E TECNICHE DI EVASIONE: RANDOM PATHS https://www.officialsite.it.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/ https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/ 
 
 https://www.officialsite.it.caf93d0f225c7a59d52ad3c4a0afc575.examplesite.com/login/caf93d0f225c7a59d52ad3c4a0afc575/ H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 19. ANTI-SPAM E TECNICHE DI EVASIONE H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I mail-tester.com
  • 20. ANTI-SPAM E TECNICHE DI EVASIONE Invisible characters:
 
 <style>span.hc {font-size:0;}</style> P<span class='hc'>1</span>a<span class='hc'>2</ span>y<span class='hc'>3</span>P<span class='hc'>4</span>a<span class='hc'>5</ span>l<span class=‘hc’>6</span>….. Allowed URL: 
 https://bit.ly/2WwFPyB H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I
  • 21. DEMO H A C K I N B O S A F E E D I T I O N - 2 4 M A G G I O 2 0 2 0 - A N D R E A D R A G H E T T I https://github.com/drego85/HackInBoSafeEdition/