📝Phishy V1 BTLO
Last updated
Last updated
You have been sent a phishing link - It is your task to investigate this website and find out everything you can about the site, the actor responsible, and perform threat intelligence work on the operator(s) of the phishing site.
💡Warning: The website and kit you see in the lab are REAL. Exercise caution when interacting with the malicious website and do not enter any sensitive information
1. The HTML page used on securedocument.net is a decoy. Where was this webpage mirrored from, and what tool was used? (Use the first part of the tool name only)(4 points)
💡Answer: 61.221.12.26/cgi-sys/defaultwebpage.cgi, HTTrack
To figure this part out, we navigated to securedocument.net/secure. This part was a little confusing for me and I had to use a write-up because I wasn’t sure how to get here, if I had access to DirBuster, it would’ve been the first tool I would’ve used in order to bruteforce and find directories.
We can see that from here, the Parent Directory is available, the Phishing kit is also here, 0ff1cePh1sh.zip
, we will be using this later.
Clicking on Parent Directory redirected us to http://securedocument.net/cgi-sys/
We viewed the page source and found where this webpage was mirrored from as well as what tool was used.
Here we can see it is mirrored from 61.221.12.26/cgi-sys/defaultwebpage.cgi
The tool used is HTTrack Website Copier
2. What is the full URL of the background image which is on the phishing landing page?(3 points)
💡Answer: http://Securedocument.net/secure/L0GIN/protected/login/portal/axCBhIt.png
To find the URL of the background image, all we have to do is right click the image itself, behind the login form and inspect element, from there navigate to “Style Editor”, I first thought we could find the URL by just using inspect element on the image itself, but that didn’t work, I looked around the page source and the image couldn’t be found anywhere. My next step was to check CSS. From there, we found the styling sheet style.css
, the first rule we can see is the body rule.
From this rule, we can see what url is used for the background, axCBhIt.png
If we add this to the URL, http://securedocument.net/secure/L0GIN/protected/login/portal/axCBhIt.png
We are redirected to the image itself, I first got the answer wrong because I didn’t realize the 0 in L0GIN
, so don’t make the same mistake I did!
3. What is the name of the php page which will process the stolen credentials?(3 points)
💡Answer: jeff.php
The way we figure this out is by looking at the page source again, we can see that the login form has a form action,
We can see it here, <form action=”jeff.php” method=”post”>
This uses a HTTP POST request method.
The HTTP POST method requests the web server accept the data enclosed in the body of the POST message. HTTP POST method is often used when submitting login or contact forms or uploading files and images to the server.
When the victim clicks the download button, the POST method will be used, this also executes the form action, jeff.php, which will process the credentials entered in the login form.
This is the PHP script, Jeff.php
4. What is the SHA256 of the phishing kit in ZIP format? (Provide the last 6 characters)(3 points)
💡Answer: fa5b48F
For this question we will be using the file we found earlier, 0ff1cePh1sh.zip
To get the SHA256 hash of the phishing kit we will be using the sha256sum linux command,
sha256sum:
Print or check SHA256 (256-bit) checksums. With no FILE, or when FILE is -, read standard input.
💡https://linux.die.net/man/1/sha256sum
To use this command, launch the terminal, and cd (Change Directory) to the directory where you downloaded the Phishing kit.
In my case, the default downloads folder is /home/ubuntu/Downloads
Enter these two commands in to the terminal, one by one.
cd /home/ubuntu/Downloads
sha256sum 0ff1cePh1sh.zip
The terminal responds with the SHA256 hash of the zip file.
An alternative to using cd to navigate directories is going to the directory yourself using the file manager and right clicking the directory and clicking “Open Terminal Here”
5. What email address is setup to receive the phishing credential logs?(3 points)
💡Answer:
boris.smets@tfl-uk.co
This can be found by looking at the PHP script from earlier (jeff.php).
Here we can see the recipient, this script has this email setup to receive the phishing credential logs. You can find it under "recipient".
6. What is the function called to produce the PHP variable which appears in the index1.html URL?
💡Answer:
getTime()
Open the index.html
file, you will notice a javascript function (getTime)
is ran which produces the timestamph in PHP.
What is the domain of the website which should appear once credentials are entered?(3 points)
💡Answer:
Office.com
Here we can see that the script that runs after the login form is submitted is at the end of the script, https://www.office.com
will be the result.
7. There is an error in this phishing kit. What variable name is wrong causing the phishing site to break? (Enter any of 4 potential answers)(3 points)
💡Answer:
userrr
This can be found by looking at the page source, this causes the phishing site to break. There are apparently 3 other potential answers but this was the first one i spotted, as well as passss
being used instead of pass