BTLO — Phishy-v1

--

BTLO (blueteamlabs.online)

You have been sent a phishing link — It is your task to investigate this website and find out everything you can about the site, the actor responsible, and perform threat intelligence work on the operator(s) of the phishing site.

Phishy V1 requires the use of the Web Browser to explore the phishing website. Navigate to the site in the lab, which looks to be an Office365 login to access an Excel file.

securedocument.net/secure/L0GIN/protected/login/portal/index1.html?1614546319649

1. The HTML page used on securedocument.net is a decoy. Where was this webpage mirrored from, and what tool was used? (Use the first part of the tool name only)

Decoy landing page

Navigating to the root of the URL, securedocument.net we see a landing page. A lot of participants were reporting the lab was broken, but this looks to be a decoy. View Page Source has a HTML comment showing that the site was mirrored.

HTML comment with website mirroring details

2. What is the full URL of the background image which is on the phishing landing page?

Right-clicking on the web page gives us a nice option to View Background Image. Doing so shows us that everything there is all a static image and definitely not dynamic links.

Viewing the background image of the web page

3. What is the name of the php page which will process the stolen credentials?

View Page Source shows us that there is a php script which will be called once the email and password has been entered.

Suspicious web page source

4. What is the SHA256 of the phishing kit in ZIP format? (Provide the last 6 characters)

Traversing backwards through the URL we can find reference to Off1cePh1sh.zip. We’re able to download this from here and run sha256sum on the downloaded file.

sha256sum of 0ff1cePh1sh.zip

5. What email address is setup to receive the phishing credential logs?

Returning to the jeff.php script which is called when submitting the form. Navigating to this shows us the $recipient who will receive the captured credentials.

jeff.php

6. What is the function called to produce the PHP variable which appears in the index1.html URL?

Inspecting the URL, we see that /index1.html is appended with a string that looks like an Epoch timestamp generated each time. Traversing backwards in the URL to view-source:http://securedocument.net/secure/LOGIN/portal/ shows us the function we’re looking for.

Function for index1.html

7. What is the domain of the website which should appear once credentials are entered?

Returning to jeff.php we see the redirection domain.

Redirection domain after entering credentials

8. There is an error in this phishing kit. What variable name is wrong causing the phishing site to break? (Enter any of 4 potential answers)

There are several ways as to why the phishing kit is broken, mainly the variable names in jeff.php not matching up to the source code.

Username and Password names not matching

View Page Source is a valuable browser utility to enable us to investigate a suspicious-looking webpage and understand the attacker’s intentions.

--

--

Chris Eastwood
Blue Team Labs Online — Walkthroughs

Incident Response, Forensic Investigations, and Threat Hunting professional, writing things to learn them better.