Webcast: How to Build a Phishing Engagement – Coding TTP’s


Episode Artwork
1.0x
0% played 00:00 00:00
Jul 14 2021 64 mins   80


Building a phishing engagement is hard. While the concept is straightforward, real-world execution is tricky. Being successful takes enormous amounts of up-front setup and knowledge in quickly evolving phishing tactics. While there is always a need to craft a custom email, the most considerable amount of work is setting up an infrastructure to make it all work.

Wouldn’t it be nice if you had a playbook of how to set everything up to save time and prevent mistakes?

What if we coded this playbook so we could share this with others and modify our tactics when things change?

In this Black Hills Information Security (BHIS) webcast, we’re going to do just that. We will take a top-down look at how a phishing engagement is designed. Then we will work through coding this design, so we don’t have to keep building a phish. Lastly, we will touch on how to fly under the radar and how coding TTP’s help save time and guarantee accuracy.

Join the BHIS Community Discord: https://discord.gg/bhis

Music By Beau: https://www.nobandwidth.io

00:00 – FEATURE PRESENTATION: How to Build a Phishing Engagement – Coding TTP’s

01:06 – About Ralph May

01:58 – Disclaimers

03:19 – Overview

03:56 – Phishing is Hard

06:33 – Infrastructure

07:12 – Operational Security

08:39 – Designing a Phish

13:18 – Phishing Emails

15:48 – 1st Tool: EVILGINX2

17:30 – EVILGINX IOC’s

18:20 – 2nd Tool: GoPhish

19:08 – GoPhish IOC’s

20:52 – 3rd Tool: NGINX