Simulated phishing server

During my school internship I had to develop few interesting tasks. Previously I talked about the USB reverse shell program I built, but there was another very interesting exercise I was tasked with creating and that was a forensics exercise where the one doing the exercise would have to analyze the phishing server log files to determine –

  1. Who sent the phishing emails.
  2. Which users received these emails.
  3. Which users opened the emails.
  4. Which users entered their credentials on the phishing site.

Here’s how I approached the task:

Read more

USB Reverse shell program

During my school internship, I was assigned the task of creating a USB Drop attack. Since I had to come up with the specific way the attack would work, I decided to design it so that when the victim connects my USB to a Windows computer, a folder named ‘secrets 2024’ would appear, which might pique the victim’s interest to open it. However, upon opening it, from the victim’s point of view, it might seem like nothing happened, although in reality, my reverse shell would be launched, which would be executed every time the device is turned on, giving me absolute access to the victim’s device. Next, I will explain step by step how the task was created.

Read more