Corben Leo Profile picture
Jan 2 8 tweets 2 min read
I hacked a large company (70k+ employees) through social engineering. Legally of course.

• I set up the infrastructure
• Scraped names & emails with LinkedIn
• Sent 200 phishing emails.

I had access to their AWS console within 2 minutes.

And much more:
1/ I used Evilnginx2 to bypass MFA (Okta & Duo)

From Okta, I could access Outlook, Sharepoint, Github, & many more services on behalf of the 50+ employees that fell for the phish.

I was blown away by how easy it was to pull off this "hack" that could've impacted 60M+ people.
2/ Phishing attacks are on the rise and are becoming more sophisticated.

Last year we saw Uber, Dropbox, Twilio, Axie Infinity ($625M theft), and more compromised through phishing.

People argue that humans are the "weakest link", yet, companies of all sizes still rely on:
3/ Forcing the consumption of cartoon training videos twice a year & hoping their SEG works.

While some organizations are moving towards FIDO2, many aren't & can't.

Companies aren't effectively equipping their employees to recognize & avoid the latest real-world threats.
4/ We aren't the weakest link.

Humans are the greatest asset and can be the most effective security measure – if you empower them.

This is what inspired me to build @BreachlessAI – a more effective way to empower security awareness:
5/ Breachless detects & explains email threats in real-time, without becoming completely dependent on email filtering.

Imagine having a security expert that explains why an email is suspicious. That's what @BreachlessAI is!

My phish could've been thwarted if Breachless was used
6/ If you'd like to try it, please join the waitlist!

If not, I'd love to hear why not.

breachless.ai
I thought I mentioned it in this thread, but I was consulting with this company so it was completely legal.

DO NOT try this if you do not have permission as it would be illegal.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Corben Leo

Corben Leo Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @hacker_

Dec 31, 2022
My favorite hacking stories of 2022:
Read 12 tweets
Nov 25, 2022
I hacked a phone company earlier last year.

I found a stupidly simple way to view the call logs of 50M customers.

Here's how I did it:
1/ I've been in this bug bounty program for quite some time.

I previously bought a phone plan so I could login and test functionality as an authenticated user.

In the dashboard, there was a tab to view your call logs.
2/ The URL contained a parameter called "subscriberId".

It contained a numerical ID, so obviously I tried to change it to another users.

Unfortunately, it didn't work.
Read 8 tweets
Sep 29, 2022
I hacked a gaming company this year.

Here's how I did it:
1/ The scope of this program was *.███.com

With a wildcard, basic recon is:

Subdomain Enumeration + HTTP server probing:

$ subfinder -d example[dot]com | httpx -o example.httpx
2/ HTTPX gave me 300 web-servers to target.

One stuck out to me:

hxxps://rendering-prd.redacted[.]com

"rendering" stuck out to me. Why?

Render means to "process information". Often to another format.

With web apps, it's typically HTML to another format.
Read 16 tweets
Sep 16, 2022
Uber was hacked.

The hacker social engineered an employee -> logged into the VPN and scanned their intranet. 👇
Apparently there was an internal network share that contained powershell scripts...

"One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite"
*allegedly hacked
Read 7 tweets
May 23, 2022
Information is key.

What sort of information could be in an Airforce Database?

Who would get hurt by that data?

Who would it benefit?

5 years ago, 17-year-old me easily gained access to an Air Force database.

Legally, through hackerone.com/deptofdefense

Here's how I did it:
1/ Back then, I practiced in the DoD's Vulnerability Disclosure Program (VDP).

This time, I was looking at the Airforce subdomains.

I decided to look for sites running PHP.

To do this, I used Google.

So, if you use Google, you should know about
2/ Google Dorks

If you don't, learn about them!

Look up "google dork cheatsheet"

Anyways,

I looked up:

site:*.af.mil + ext:php

and

site:.af.mil + filetype:php

and
Read 10 tweets
May 3, 2022
How you can learn to hack web3 (and protect millions of dollars):
1/
Become a dev (to break you must understand):

• Read "Mastering Ethereum" (It's on GitHub)
• Learn Solidity:
• CryptoZombies
• solidity-by-example[.]org
• Solidity Docs
• Learn how to use HardHat
• Familiarize yourself with widely used contracts (EIP 20)
2/
• Do these challenges:
• Ethernaut
• Capture the Ether
• Damn Vulnerable DeFi
• Read writeups & postmortems
• Do some CTF's (ex: @paradigm's)
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(