ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    OWA is vulnerable to Phishing

    Scheduled Pinned Locked Moved IT Discussion
    owaexchange 2013phishingpharmingcredential harvesting
    27 Posts 10 Posters 6.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Deleted74295D
      Deleted74295 Banned @IRJ
      last edited by

      @IRJ said in OWA is vulnerable to Phishing:

      @Breffni-Potter said in OWA is vulnerable to Phishing:

      Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

      Same again for the banking website.

      It's not easy to clone, because the URL is the same for Google and Online banking. Also Online banking shows an image to confirm your identity and google shows a username on the next page.

      Is it possible? I am sure it is. Is it easy? no

      Yeah but what if the username is just the email address you typed in something that I know most users would overlook, as for URL checking, not sure about that.

      Space Coast Credit Union? If those guys show an image of you that's fine but I know of at least 4 banks in the UK won't do that, I think that's fairly rare.

      IRJI 1 Reply Last reply Reply Quote 0
      • IRJI
        IRJ
        last edited by

        @Breffni-Potter I will post on my blog how I did it and you will see why cloning Google or Online banking is much more difficult.

        Like I said, I am sure there is a way to do it if you had to use that as your attack vector. I am going to guess chances are if you steal facebook credentials with a gmail username that the password is probably the same for google for most users.

        1 Reply Last reply Reply Quote 1
        • IRJI
          IRJ @Deleted74295
          last edited by

          @Breffni-Potter said in OWA is vulnerable to Phishing:

          @IRJ said in OWA is vulnerable to Phishing:

          @Breffni-Potter said in OWA is vulnerable to Phishing:

          Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

          Same again for the banking website.

          It's not easy to clone, because the URL is the same for Google and Online banking. Also Online banking shows an image to confirm your identity and google shows a username on the next page.

          Is it possible? I am sure it is. Is it easy? no

          Yeah but what if the username is just the email address you typed in something that I know most users would overlook, as for URL checking, not sure about that.

          Space Coast Credit Union? If those guys show an image of you that's fine but I know of at least 4 banks in the UK won't do that, I think that's fairly rare.

          Space Coast is our competitor. I am not sure if they show an image, but I know our online banking does.

          stacksofplatesS 1 Reply Last reply Reply Quote 0
          • dafyreD
            dafyre
            last edited by

            You could also spin up a GoPhish server... https://getgophish.com/ (I haven't tried this yet, but it's in my list of things to check).

            IRJI 1 Reply Last reply Reply Quote 2
            • IRJI
              IRJ @dafyre
              last edited by

              @dafyre said in OWA is vulnerable to Phishing:

              You could also spin up a GoPhish server... https://getgophish.com/ (I haven't tried this yet, but it's in my list of things to check).

              I gotta try that one.

              1 Reply Last reply Reply Quote 0
              • IRJI
                IRJ
                last edited by

                Most of the time having good locks on your doors and windows in your house will keep most bad guys out. Most hackers are the same way and go after easy prey. If a bad guy is specifically scoping out your house and targeting it, then you have more to worry about. The same thing with IT security.

                dafyreD 1 Reply Last reply Reply Quote 2
                • dafyreD
                  dafyre @IRJ
                  last edited by

                  @IRJ said in OWA is vulnerable to Phishing:

                  Most of the time having good locks on your doors and windows in your house will keep most bad guys out. Most hackers are the same way and go after easy prey. If a bad guy is specifically scoping out your house and targeting it, then you have more to worry about. The same thing with IT security.

                  Nothing wrong with making sure that your locks work well... and fixing the ones that don't. 8-)

                  IRJI 1 Reply Last reply Reply Quote 1
                  • IRJI
                    IRJ @dafyre
                    last edited by

                    @dafyre said in OWA is vulnerable to Phishing:

                    @IRJ said in OWA is vulnerable to Phishing:

                    Most of the time having good locks on your doors and windows in your house will keep most bad guys out. Most hackers are the same way and go after easy prey. If a bad guy is specifically scoping out your house and targeting it, then you have more to worry about. The same thing with IT security.

                    Nothing wrong with making sure that your locks work well... and fixing the ones that don't. 8-)

                    Exactly. My job has become hacking 😎

                    1 Reply Last reply Reply Quote 1
                    • stacksofplatesS
                      stacksofplates @IRJ
                      last edited by stacksofplates

                      @IRJ said in OWA is vulnerable to Phishing:

                      @Breffni-Potter said in OWA is vulnerable to Phishing:

                      @IRJ said in OWA is vulnerable to Phishing:

                      @Breffni-Potter said in OWA is vulnerable to Phishing:

                      Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

                      Same again for the banking website.

                      It's not easy to clone, because the URL is the same for Google and Online banking. Also Online banking shows an image to confirm your identity and google shows a username on the next page.

                      Is it possible? I am sure it is. Is it easy? no

                      Yeah but what if the username is just the email address you typed in something that I know most users would overlook, as for URL checking, not sure about that.

                      Space Coast Credit Union? If those guys show an image of you that's fine but I know of at least 4 banks in the UK won't do that, I think that's fairly rare.

                      Space Coast is our competitor. I am not sure if they show an image, but I know our online banking does.

                      I forgot you live down there. My wife's aunt works for Florida Community Bank.

                      1 Reply Last reply Reply Quote 0
                      • DustinB3403D
                        DustinB3403
                        last edited by

                        This topic blew up.

                        Wow.

                        1 Reply Last reply Reply Quote 0
                        • IRJI
                          IRJ
                          last edited by

                          I threw this together really quick. There may be typos, etc. I gotta go run some quick errands.

                          joelradon.com/phishing-test-employees/

                          1 Reply Last reply Reply Quote 1
                          • J
                            Jstear
                            last edited by

                            I've been doing similar using SPToolkit. When the user clicks on the login/submit/go button it logs their email address and IP, sends them to a webpage that has training on it and explains what they just did and why it is bad, and finally they have to acknowledge that they read the page. I get a report with all of that within the hour. Works great.

                            1 Reply Last reply Reply Quote 1
                            • momurdaM
                              momurda
                              last edited by

                              Quick question; How would you go about getting your phishing page to OWA users at a company you were targeting? send them an email with a subject like 'click here to login to your company webmail"? with a link to the fake owa site? They would already have their email open. I suppose it could happen that way, these are users we're talking about.
                              In the Eternal War on Spam/Malware, what can be done?

                              J M 2 Replies Last reply Reply Quote 0
                              • J
                                Jstear @momurda
                                last edited by

                                @momurda said in OWA is vulnerable to Phishing:

                                Quick question; How would you go about getting your phishing page to OWA users at a company you were targeting? send them an email with a subject like 'click here to login to your company webmail"? with a link to the fake owa site? They would already have their email open. I suppose it could happen that way, these are users we're talking about.
                                In the Eternal War on Spam/Malware, what can be done?

                                I've told users they have to change their webmail password. If they fail I explain to them they don't have a special login for webmail and they will get an official email, not a generic change you password one.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  marcinozga
                                  last edited by

                                  I can't believe that everyone here is dead wrong. None of the websites mentioned here or OWA are vulnerable to phishing. Not a single website on Internet is. Users are vulnerable to phishing, not websites. Phishing is a social engineering technique to deceive users, not websites. You can create fake Google login form that has both username and password fields and users will fall for it.

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    marcinozga @momurda
                                    last edited by

                                    @momurda said in OWA is vulnerable to Phishing:

                                    Quick question; How would you go about getting your phishing page to OWA users at a company you were targeting? send them an email with a subject like 'click here to login to your company webmail"? with a link to the fake owa site? They would already have their email open. I suppose it could happen that way, these are users we're talking about.
                                    In the Eternal War on Spam/Malware, what can be done?

                                    Instant messenger is one option.

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      aidan_walsh @Deleted74295
                                      last edited by

                                      @Breffni-Potter said in OWA is vulnerable to Phishing:

                                      Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

                                      Same again for the banking website.

                                      Thats exactly what happens. You'd be surprised at what passes for phishing attacks, and how many people fall for them. I've seen ones that have asked people "for security purpose" to enter all 50 4-digit code card entries, something a bank would obviously never do.

                                      And yet...

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @Deleted74295
                                        last edited by

                                        @Breffni-Potter said in OWA is vulnerable to Phishing:

                                        Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

                                        Same again for the banking website.

                                        Especially as real OWA makes you go to a second page and doesn't take the password on the first one. It's a dead field.

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @aidan_walsh
                                          last edited by

                                          @aidan_walsh said in OWA is vulnerable to Phishing:

                                          @Breffni-Potter said in OWA is vulnerable to Phishing:

                                          Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

                                          Same again for the banking website.

                                          Thats exactly what happens. You'd be surprised at what passes for phishing attacks, and how many people fall for them. I've seen ones that have asked people "for security purpose" to enter all 50 4-digit code card entries, something a bank would obviously never do.

                                          And yet...

                                          Partially that's because real banks have done that traditionally.

                                          stacksofplatesS 1 Reply Last reply Reply Quote 1
                                          • stacksofplatesS
                                            stacksofplates @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in OWA is vulnerable to Phishing:

                                            @aidan_walsh said in OWA is vulnerable to Phishing:

                                            @Breffni-Potter said in OWA is vulnerable to Phishing:

                                            Ummm....as an attacker, why can't I just have a next page fake confirmation which forgets the profile photo (easy to overlook in a hurry) and get the password for google anyway?

                                            Same again for the banking website.

                                            Thats exactly what happens. You'd be surprised at what passes for phishing attacks, and how many people fall for them. I've seen ones that have asked people "for security purpose" to enter all 50 4-digit code card entries, something a bank would obviously never do.

                                            And yet...

                                            Partially that's because real banks have done that traditionally.

                                            Like AMEX. I needed a password reset and they asked all of the info on my card, other than my name and expiration.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post