githubEdit

Initial Compomise

Initial Compromise

Enumerating Outlook Web Access (OWA) to identify valid user and conducting password spray attack

Identify the mail server of given domain

$ dig cyberbotic.io
$ ./dnscan.py -d cyberbotic.io -w subdomains-100.txt

Idenitfy the NETBIOS name of target domain

ps> ipmo C:\Tools\MailSniper\MailSniper.ps1
ps> Invoke-DomainHarvestOWA -ExchHostname mail.cyberbotic.io

Extract Employee Names (FirstName LastName) and Prepare Username List

$ ~/namemash.py names.txt > possible.txt

Validate the username to find active/real usernames

ps> Invoke-UsernameHarvestOWA -ExchHostname mail.cyberbotic.io -Domain cyberbotic.io -UserList .\Desktop\possible.txt -OutFile .\Desktop\valid.txt

Conduct Password Spraying attack with known Password on identified users

Use Identified credentials to download Global Address List

Create a malicious Office file having embedded macro

Step 1: Open a blank word document "Document1". Navigate to View > Macros > Create. Changes macros in to Document1. Name the default macro function as AutoOpen. Paste the below content and run for testing

Step 2: Generate a payload for web delivery (Attacks > Scripted Web Delivery (S) and generate a 64-bit PowerShell payload with your HTTP/DNS listener). Balance the number of quotes

Step 3: Save the document as .doc file and send it as phising email

Last updated