Combatting Incident Responders with Apache mod_rewrite Logo

Combatting Incident Responders with Apache mod_rewrite

0
Free
Visit Website

Any phishing campaign involving an active incident response element usually requires some evasive steps to prolong its longevity. This often includes being stealthier, performing anti-forensics actions, or avoiding certain tradecraft altogether. Phishing is no different, and is often the most ‘vulnerable’ part of a campaign from an active IR perspective. Using a distributed infrastructure built with independent components helps reduce the risk of the overall architecture being blocked, but individual phishing campaigns are likely to be caught and blocked throughout the duration. The longer we can stretch out the usability of each of those campaigns, the better our chances of gaining access. Using Apache mod_rewrite rules, we can rewrite potential incident responder or security appliance requests to an innocuous website or the target’s real website. While the methods discussed below won’t stave off a concerted investigation, it will hopefully make the malicious website pass the ‘sniff test’ with recipients and lower level help desk or incident responders. It’s important to note that these techniques could prevent valid phishing victims from reaching your malicious website. You will need to weigh the risks of losing out on potential clicks against the risk of being detected.

FEATURES

ALTERNATIVES

A practical guide on NTLM relaying for Active Directory attacks.

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

A tool that simplifies the installation of tools and configuration for Kali Linux

A C#-based Command and Control Framework for remote access and control of compromised systems.

A tool for iOS pentesting and research with a GUI version available.

Metta is an information security preparedness tool for adversarial simulation.

Chameleon aids in evading proxy categorization to bypass internet filters.

Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.

PINNED