Deploying discreet infrastructure for targeted phishing campaigns

Presented at Diana Initiative 2020 Virtual, Aug. 22, 2020, 11 a.m. (45 minutes)

Phishing attacks are an extremely common attack vector that has been used for many years, and the potential impact and risk involved are well known to most Internet users. However, it is still a highly relevant attack vector being used in the wild, affecting many victims. Phishing attacks exploits the vulnerable human factor. The words easy and phishing never really seem to go together. Setting up a proper phishing infrastructure can be a real pain. This talk aims to walk you through the whole process of deploying an phishing campaign infrastructure from the perception of an attacker.

Presenters:

  • Sreehari Haridas (invisible) - UST Global
    Sreehari is an experienced Security Researcher, who has 3 years of professional experience. He is a Web application Penetration tester and a renowned Bug Bounty Hunter. Currently Sreehari is working as a Cyber Security Engineer at UST Global, formerly a security consultant with EY. Being a security enthusiast, he has tested various applications and websites for vulnerabilities and has received 50+ Hall of fame in different companies like Google, Sony, Adobe, eBay etc. He also has interest in reverse engineering techniques and exploits development. He has bagged 3rd place in Asia region for the Global Cyberlympics Capture the flag(CTF) competition and 6th position in international Hackthebox.eu Capture the flag platform. He was involved in organizing Red Team Village - Red vs Blue CTF at C0c0n security conference., 2019 Sreehari is a member of DEFCON Group Trivandrum (<https://dc0471.org/about.html>), and an operator/CTF builder at Red Team Village community. (<https://redteamvillage.org/>) He was a board member of OWASP Kerala chapter and an active volunteer at Kerala Police Cyberdome.

Links:

Similar Presentations: