Think of it as a Metasploit-type framework for email-borne attacks: A researcher is preparing to release a free hacking platform for targeted email and phishing attacks that includes payloads for popular Web threats.
The new so-called Lunker hacking tool -- which was initially developed as a pure spear phishing tool -- has been expanded to execute various types of exploits that target the so-called human Layer 8, including cross-site scripting, cross-site request forgery, Trojans, and clickjacking, says Joshua Perrymon, who built the tool. Perrymon, who is CEO of PacketFocus, will show off Lunker for the first time next week at the Open Web Application Security Project (OWASP) conference in New York. (See Disclosure of Major New Web 'Clickjacking' Threat Gets Deferred.)
Perrymon says the tool is for conducting targeted attacks in-house, and lends itself to much more than just spear-phishing as he first envisioned. (See Free Spear-Phishing Tool on Tap.) I have since added the ability to select multiple payloads such as XSS and other browser exploits to use email as the attack vector, so now its a new ball game, he says.
Many attacks today require some type of action by the potential victim, so Perrymon's attack platform lets an organization test and analyze what their users would do when hit with these types of attacks. The tool isnt looking at the Web flaws themselves, but at what happens on the victims end, Perrymon says. The goal is to measure the effectiveness of the organizations security awareness program... We want to [see if we can make] the user do things [that] security awareness programs say not to do, he says.
This will also ultimately help educate users on what these attacks look like, he says. You can nail down [what the user did] into a detailed training curriculum," Perrymon says. "It depends on what you are trying to accomplish... If youre doing a full-scope penetration test, you could use this tool as a further exploit.
Lunker is also fully customizable so that the attacks look as realistic as possible, with the proper headers, footers, and company logos you're spoofing, for instance. "You have to make that attack realistic... So that it wouldnt trigger any alarms, he says. And you can add custom payloads to the phishing email.
Perrymon says he also plans to add man-in-the-middle modules to Lunker for performing reconnaissance on a potential targeted organization, for example, or for nabbing a user's token authentication details.
The tool will be available in two versions -- a "local" version of the VMware-based tool that performs demos but doesn't actually send real messages outside Lunker, and then a registered version, which can be used to actively send out the attacking emails. "This is for safety purposes to minimize malicious activity," Perrymon says.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.