Lee Renahan
Lee Renahan
  • 8
  • 2 796
Quasar RAT delivered through HTML smuggling - Defending with an Attackers Mindset
HTML attachment attacks are increasing as more organisations move to URL rewriting, and attackers work to bypass click time protection. Opening the attachment in a browser means its almost indistinguishable to an end user, who may not associate links in emails and links in attachments as different things, but the security challenges a lot of vendors face in being able to scan and block these attachments mean too many of these reach user's inboxes.
The video below helps to demonstrate how easy it can be for attackers to package an intrusive malware, like a remote access trojan, into an otherwise legitimate email, and trick users into downloading and executing payloads on their behalf. The videos are designed to show you how easy it can be for even sophisticated attackers to put your organisation, or even your friends and family, at risk.
All content is my own creation, or taken from contributors on Pixabay, Pexels, Videvo or Mixkit, to be used under the Creative Commons license
Theme tune by AlexiAction
zhlédnutí: 756

Video

Password hash cracking with Hashcat and CUPP - Defending with an Attackers Mindset
zhlédnutí 87Před 4 měsíci
The advice to use long complex passwords is commonly given, but few people understand why it is necessary, and how easy it can be for bad actors to crack less secure passwords. To show why this advice is so important I'm going to demonstrate a couple of different tools and attacks. With Hashcat I'll show how a brute force and dictionary attack work, and with CUPP I'll show how easily identifiab...
QR code to Meterpreter compromise on Android phone - Defending with an attackers mindset
zhlédnutí 62Před 5 měsíci
QR codes are everywhere. Because they are now so widespread and used by so many legitimate services people have built trust with them, despite the fact that the data they can contain is not able to be interpreted by the human eye. Let's look at a potential qr code attack in action to show why you should question what you scan before opening your camera app. All content is my own creation, filme...
The beer drinkers guide to the Internet
zhlédnutí 62Před 6 měsíci
Have you ever been frustrated trying to explain technical concepts about the internet to people who don't speak the lingo? Or are you non-technical and want to understand some of terms your hear every day, like IP address and HTTP, but are too afraid to ask? Well struggle no more because this video has been made to help explain how those bits and bytes work in terms nearly everyone can understa...
The beer drinkers guide to email authentication
zhlédnutí 471Před 8 měsíci
SPF, DKIM and DMARC are difficult technical concepts but their use in modern email is crucially important in protecting your users, customers and your brand. This video was designed to help simplify some of the concepts into relatable terms. Substitute beer with wine, coffee, lemonade, whatever you're drink of choice, and the tough technical concept of email authentication becomes a little more...
Evilginx with MFA bypass
zhlédnutí 1,1KPřed 10 měsíci
Evilginx with MFA bypass
Stealing credentials stored in a Chome browser
zhlédnutí 169Před 10 měsíci
Stealers don't get the headlines that ransomware and BEC attacks do, but can be equally as destructive if deployed on the right users machines. If a user stores credentials to critical applications in their browser, and the application isn't using hardened MFA technology and FIDO authentication, then the data within that application may be at risk. Stealers are simply deployed tools with minima...
Credential farming - harvest and re-use
zhlédnutí 72Před 10 měsíci
​Credentials are the lifeblood of cyber-attacks. Access to users accounts opens up lots of potential attack vectors for a bad actor. They could use the account to attack people in your address book, they can understand when payments will be made to initiate BEC attacks, they can access all of the users files and upload their own malware to cloud repositories, and they can also move laterally wi...

Komentáře

  • @joeburns8059
    @joeburns8059 Před 19 dny

    Anyone noticed this doesn't work anymore, as of yesterday when I last tested. It seems MS are now automatically signing out the sessions. Without any additional configuration required on CA.

  • @mecipsa_1
    @mecipsa_1 Před 25 dny

    hello bro can you teach me somethings about quasar rat ? i didnt really understand the video u made so i just need some help from you please .

  • @user-wv4lv8zm2k
    @user-wv4lv8zm2k Před 7 měsíci

    hey i am getting a context deadline error while creating the certs. is there a fix for it?

  • @exploreyourdreamlife
    @exploreyourdreamlife Před 8 měsíci

    I'm so thankful for this video's guidance on credential farming. Thanks, creator, for simplifying a complex topic. Liked and Subbed!

  • @pigalex
    @pigalex Před 8 měsíci

    This is gold.

  • @Day1kingfx
    @Day1kingfx Před 9 měsíci

    Do you have the google phishlet?

    • @leerenahan4043
      @leerenahan4043 Před 9 měsíci

      sorry no, I only tested with the O365 one

    • @aden-bilal
      @aden-bilal Před 2 měsíci

      hey did you found any google phishlet

  • @Eastsidecorleone
    @Eastsidecorleone Před 9 měsíci

    I’m interested in custom phishlets, do you have a telegram?

    • @leerenahan4043
      @leerenahan4043 Před 9 měsíci

      I only used the default templates for testing, I didn't try any custom ones