Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/18/2008
08:25 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Tool Lets You Target Your Own End Users

New open-source attack platform that performs email-based Web attacks debuts next week at OWASP conference

Think of it as a Metasploit-type framework for email-borne attacks: A researcher is preparing to release a free hacking platform for targeted email and phishing attacks that includes payloads for popular Web threats.

The new so-called Lunker hacking tool -- which was initially developed as a pure spear phishing tool -- has been expanded to execute various types of exploits that target the so-called human “Layer 8,” including cross-site scripting, cross-site request forgery, Trojans, and clickjacking, says Joshua Perrymon, who built the tool. Perrymon, who is CEO of PacketFocus, will show off Lunker for the first time next week at the Open Web Application Security Project (OWASP) conference in New York. (See Disclosure of Major New Web 'Clickjacking' Threat Gets Deferred.)

Perrymon says the tool is for conducting targeted attacks in-house, and lends itself to much more than just spear-phishing as he first envisioned. (See Free Spear-Phishing Tool on Tap.) “I have since added the ability to select multiple payloads such as XSS and other browser exploits to use email as the attack vector, so now it’s a new ball game,” he says.

Many attacks today require some type of action by the potential victim, so Perrymon's attack platform lets an organization test and analyze what their users would do when hit with these types of attacks. The tool isn’t looking at the Web flaws themselves, but at what happens on the victim’s end, Perrymon says. “The goal is to measure the effectiveness of the organization’s security awareness program... We want to [see if we can make] the user do things [that] security awareness programs say not to do,” he says.

This will also ultimately help educate users on what these attacks look like, he says. “You can nail down [what the user did] into a detailed training curriculum," Perrymon says. "It depends on what you are trying to accomplish... If you’re doing a full-scope penetration test, you could use this tool as a further exploit.”

Lunker is also fully customizable so that the attacks look as realistic as possible, with the proper headers, footers, and company logos you're spoofing, for instance. "You have to make that attack realistic... So that it wouldn’t trigger any alarms,” he says. And you can add custom payloads to the phishing email.

Perrymon says he also plans to add man-in-the-middle modules to Lunker for performing reconnaissance on a potential targeted organization, for example, or for nabbing a user's token authentication details.

The tool will be available in two versions -- a "local" version of the VMware-based tool that performs demos but doesn't actually send real messages outside Lunker, and then a registered version, which can be used to actively send out the attacking emails. "This is for safety purposes to minimize malicious activity," Perrymon says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • PacketFocus Security Solutions

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Navigating Security in the Cloud
    Diya Jolly, Chief Product Officer, Okta,  12/4/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: "The security team seem to be taking SiegeWare seriously" 
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-5098
    PUBLISHED: 2019-12-05
    An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be trigger...
    CVE-2012-1104
    PUBLISHED: 2019-12-05
    A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
    CVE-2019-17387
    PUBLISHED: 2019-12-05
    An authentication flaw in the AVPNC_RP service in Aviatrix VPN Client through 2.2.10 allows an attacker to gain elevated privileges through arbitrary code execution on Windows, Linux, and macOS.
    CVE-2019-17388
    PUBLISHED: 2019-12-05
    Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications.
    CVE-2019-18381
    PUBLISHED: 2019-12-05
    Norton Password Manager, prior to 6.6.2.5, may be susceptible to a cross origin resource sharing (CORS) vulnerability, which is a type of issue that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served.