, 16 tweets, 13 min read
My Authors
Read all threads
:: Phishing Hunting Thread ::

This is a thread about how to hunt and find #Phishing sites.
Retweets would be great to help spread the knowledge and please add your own techniques, ideas and suggestions.

Let's go hunting!
Firstly we need a site to use as a pivot. I have attached a number of sources at the bottom of this thread. For demonstration purposes we will use this site ::

hxxp://www.new.froid-guyader.fr/libraries/sharepointcontract/

This is a #Phishing site against Microsoft Office
Initially let's see if there is a #PhishingKit or #OpenDir on the domain. Enumeration on the domain is important. This is a example of sites to load and see ::

- hxxp://www.new.froid-guyader.fr/libraries/
- hxxp://www.new.froid-guyader.fr/
- hxxp://www.froid-guyader.fr/
Sadly, no results for that. Next hunting down phishing kits. To do this we can guess the name of the zip folder used. It is normally the same of the directory in which it resides. Running checks on the following URLs is a great starting point ...
- hxxp://www.new.froid-guyader.fr/libraries/sharepointcontract.zip
- hxxp://www.new.froid-guyader.fr/libraries.zip

Again sadly no hits. There are some great tools to automate this. I suggest checking out this tool made by @cybercdh :: github.com/cybercdh/phish…
Next step will be using @urlscanio to check the HTTP requests the web page made. This will show a list of pages and links requested by the page. I find a unique looking request and then finding other sites that use this resource.
The alternative is to hunt using legitimate resources such as a companies logo and find sites using it. The majority of these are phishing sites pulling the resources off the legitimate site.
For this hunt I choose the resource :: Converged1033.css

Using URLScan I can run a search to check which other sites call this resource ::
filename:"Converged1033.css"
That resource is used in over 18,000 sites. All of which are probably malicious. Next step is to look through the results. A good site is one which is clean according to Google and not submitted via a phishing feed. This is known as a undetected site. Found one!
We can also use search engines to pivot using resources :: Google, duckduckgo, yandex.

This is a big #phishing campaign. There is a huge number of sites.
There is further analysis you can do using the infrastructure of the site, checking the hosting IP for example. page.ip:"213.186.33.2"
Using name servers is also a pivot and tracking technique. Thanks to @johnsec11 for pointing this out to me. After chaseonlineservicess[.]com went down,
chasecardonlinerestore[.]com picked up the same campaign. Both URLs used the
same name server steelstory[.]org
That is all for now. I will be back with other information later. Please RT and share this thread to help others. Thanks 👍
As stated at the start of this thread here are some great #Phishing accounts to follow ::
- @JCyberSec_
- @IpNigh
- @PhishingAi
- @packet_Wire
- @ActorExpose
- @PhishStats
- @FeedPhish
- @JayTHL
- @Cyberfishio
- @dave_daves
- @ozuma5119
- @smica83
@PhishStats @open_phish @PhishTank_Bot @urlscanio ⚠️Update - Part Two has been published.⚠️

:: Phishing Admin Panel Hunting Thread ::

In this thread we will find ways to hunt and attribute phishing admin panels.

This is a continuation from my #phishing hunting thread released earlier this year

Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Jake

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!