📓
Red Team Notes
  • Introduction
  • Red Team Notes 2.0
  • Red Team
  • Initial Access
    • Spear Phishing Links
      • HTA Files
      • Binaries
      • PDF Files
      • SET(Social-Engineering Toolkit)
    • Spear Phishing Attachments
      • Macros
      • Dynamic Data Exchange
      • SCR Files
      • LNK Files
    • (+) Links and Attachments
  • Execution
    • Component Object Model and Distributed COM
    • MSHTA
    • PowerShell
    • Rundll32
    • Scheduled Tasks
    • Scripting
    • Trusted Developer Utilities
      • MSBuild
      • Regsvr32
    • Windows Remote Management
    • Windows Management Instrumentation (WMI)
  • Persistence
    • Scheduled Tasks
    • Create Account
    • DLL Search Order Hijacking
    • Hooking
    • Logon Scripts
    • Modify Existing Service
    • New Service
    • Path Interception
    • Registry Keys / StartUp Folder
    • ShortCut Modification
  • Privesc
    • Access Token Manipulation
    • DLL Search Order Hijacking
    • Exploitation for Privesc
    • File System Permissions Weakness
    • Always Install Elevated
  • Defense Evasion
  • Credential Access
    • Credential Dumping
    • Kerberoasting
    • LLMNR/NBT-NS Poisoning and Relay
  • Discovery
  • Lateral Movement
    • Pass the Ticket
    • Pass the Hash
    • Remote Desktops
    • Internal Spearphishing
    • Windows Admin Shares
    • Component Object Model and Distributed COM
    • Windows Remote Management
  • Collection
  • Command and Control
  • Exfiltration
  • Impact
  • Active Directory
    • Introduction
      • Kerberos
      • LDAP
    • Enumeration
    • Attacks
      • Unconstrained Delegation
      • Constrained Delegation
      • DCSync
      • Kerberoasting
      • Silver Tickets
      • Golden Tickets
  • Detection
    • Detection
    • Initial Access
    • Execution
      • MSHTA (Detection)
  • Resources & References
    • References & Resources
Powered by GitBook
On this page

Was this helpful?

  1. Initial Access

Spear Phishing Links

The use of Links attached to the email or sent in plain text to confuse the victim on to clicking and avoiding Email providers scanners.

Spearphishing with a link is a specific variant of spearphishing. It is different from the other forms of spearphishing in that employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. The visited website may compromise the web browser. using an exploit, or the user will be prompted to download applications, documents, zip files, or even an executable depending on the pretext for the email in the first place. Links may also direct users to malicious applications designed to Steal Application Access Tokens in order to gain access to protected applications and information.

I setup a few examples to demonstrate this attack these are very basic but having this simple understanding will help in comprehending that these attacks can get more sophisticated.

The following demonstrations will guide in how to setup the attack and explain why/or how it does it.

Tools

Plenty of tools can help automate the tasks in creating replication's of thet argeted site you are trying to clone. The majority of these tools are focused in Capturing Credentials but some can be modified into downloading binaries and other files.

PreviousInitial AccessNextHTA Files

Last updated 5 years ago

Was this helpful?