Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain.

another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain.

Scheduled Pinned Locked Moved Uncategorized
9 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchange
    wrote last edited by
    #1

    another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain. dump it into virustotal. click on the details tab. Look at the SSL certificate details. More than half the time, they use a wildcard SSL cert. Congratulations, you just mapped out most of their phishing infrastructure because they re-use the same wildcard SSL cert fuckin' everywhere.

    onedawnconstant@climatejustice.socialO reverseics@infosec.exchangeR johnley@infosec.exchangeJ spinnyspinlock@infosec.exchangeS 4 Replies Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • da_667@infosec.exchangeD da_667@infosec.exchange

      another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain. dump it into virustotal. click on the details tab. Look at the SSL certificate details. More than half the time, they use a wildcard SSL cert. Congratulations, you just mapped out most of their phishing infrastructure because they re-use the same wildcard SSL cert fuckin' everywhere.

      onedawnconstant@climatejustice.socialO This user is from outside of this forum
      onedawnconstant@climatejustice.socialO This user is from outside of this forum
      onedawnconstant@climatejustice.social
      wrote last edited by
      #2

      @da_667 Dollar store cryptography at its finest.

      1 Reply Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain. dump it into virustotal. click on the details tab. Look at the SSL certificate details. More than half the time, they use a wildcard SSL cert. Congratulations, you just mapped out most of their phishing infrastructure because they re-use the same wildcard SSL cert fuckin' everywhere.

        reverseics@infosec.exchangeR This user is from outside of this forum
        reverseics@infosec.exchangeR This user is from outside of this forum
        reverseics@infosec.exchange
        wrote last edited by
        #3

        @da_667 the thing that really worries me about this stuff:

        these phishing tests use weird domains, which spam systems have to pass through (otherwise your phishing test is blocked by your antiphishing system).

        Now what happens if proofpoint (or whoever) forgets to renew the phishing-test-domain but also forgets to remove the phishing-test-domain from their 'always allow' list? And then some actual phishers register the domain and start using it for, I dunno, phishing?

        Anyway I'll steal @Dio9sys 's line and say "Hi, I get paid to be paranoid and anxious"

        ligniform@infosec.exchangeL 1 Reply Last reply
        0
        • da_667@infosec.exchangeD da_667@infosec.exchange

          another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain. dump it into virustotal. click on the details tab. Look at the SSL certificate details. More than half the time, they use a wildcard SSL cert. Congratulations, you just mapped out most of their phishing infrastructure because they re-use the same wildcard SSL cert fuckin' everywhere.

          johnley@infosec.exchangeJ This user is from outside of this forum
          johnley@infosec.exchangeJ This user is from outside of this forum
          johnley@infosec.exchange
          wrote last edited by
          #4

          @da_667 I opt for the outlook rule of “if it has a knowbe4 header in it, delete and skip trash”

          1 Reply Last reply
          0
          • da_667@infosec.exchangeD da_667@infosec.exchange

            another regular reminder: if your organization sends out phishing email tests on the regular - document the sending domain. dump it into virustotal. click on the details tab. Look at the SSL certificate details. More than half the time, they use a wildcard SSL cert. Congratulations, you just mapped out most of their phishing infrastructure because they re-use the same wildcard SSL cert fuckin' everywhere.

            spinnyspinlock@infosec.exchangeS This user is from outside of this forum
            spinnyspinlock@infosec.exchangeS This user is from outside of this forum
            spinnyspinlock@infosec.exchange
            wrote last edited by
            #5

            @da_667 I like the "inbox rule to trash based on X-PHISHTEST header" approach too

            1 Reply Last reply
            0
            • reverseics@infosec.exchangeR reverseics@infosec.exchange

              @da_667 the thing that really worries me about this stuff:

              these phishing tests use weird domains, which spam systems have to pass through (otherwise your phishing test is blocked by your antiphishing system).

              Now what happens if proofpoint (or whoever) forgets to renew the phishing-test-domain but also forgets to remove the phishing-test-domain from their 'always allow' list? And then some actual phishers register the domain and start using it for, I dunno, phishing?

              Anyway I'll steal @Dio9sys 's line and say "Hi, I get paid to be paranoid and anxious"

              ligniform@infosec.exchangeL This user is from outside of this forum
              ligniform@infosec.exchangeL This user is from outside of this forum
              ligniform@infosec.exchange
              wrote last edited by
              #6

              @reverseics @da_667 @Dio9sys KnowBe4 publish a list of their domains, even then they seem to add more with every passing day.

              viss@mastodon.socialV 1 Reply Last reply
              0
              • ligniform@infosec.exchangeL ligniform@infosec.exchange

                @reverseics @da_667 @Dio9sys KnowBe4 publish a list of their domains, even then they seem to add more with every passing day.

                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.social
                wrote last edited by
                #7

                @ligniform @reverseics @da_667 @Dio9sys the last few times i had to do phishing shits, i learned that clownshoes outfits like knowbe4 ask customers to configure direct to inbox delivery systems that bypass 100% of mta controls, rendering all their 'testing' bullshit worthless since it would never get past antispam and various other heuristic filters. real attackers have a way tougher time

                ligniform@infosec.exchangeL 1 Reply Last reply
                0
                • viss@mastodon.socialV viss@mastodon.social

                  @ligniform @reverseics @da_667 @Dio9sys the last few times i had to do phishing shits, i learned that clownshoes outfits like knowbe4 ask customers to configure direct to inbox delivery systems that bypass 100% of mta controls, rendering all their 'testing' bullshit worthless since it would never get past antispam and various other heuristic filters. real attackers have a way tougher time

                  ligniform@infosec.exchangeL This user is from outside of this forum
                  ligniform@infosec.exchangeL This user is from outside of this forum
                  ligniform@infosec.exchange
                  wrote last edited by
                  #8

                  @Viss @reverseics @da_667 @Dio9sys the Scientology stuff aside, KB4 is such a shady place. Account managers constantly trying to get you on sales calls, and yeah, just telling you to add their domains to bypass every filter instead of making realistic tests.

                  viss@mastodon.socialV 1 Reply Last reply
                  0
                  • ligniform@infosec.exchangeL ligniform@infosec.exchange

                    @Viss @reverseics @da_667 @Dio9sys the Scientology stuff aside, KB4 is such a shady place. Account managers constantly trying to get you on sales calls, and yeah, just telling you to add their domains to bypass every filter instead of making realistic tests.

                    viss@mastodon.socialV This user is from outside of this forum
                    viss@mastodon.socialV This user is from outside of this forum
                    viss@mastodon.social
                    wrote last edited by
                    #9

                    @ligniform @reverseics @da_667 @Dio9sys of course! it was kevin mitnicks company

                    1 Reply Last reply
                    0
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups