{"id":179,"date":"2018-12-16T10:23:47","date_gmt":"2018-12-16T10:23:47","guid":{"rendered":"http:\/\/www.samuelhuntley.com\/?p=179"},"modified":"2018-12-16T10:23:47","modified_gmt":"2018-12-16T10:23:47","slug":"phishing-attacks-advanced-attack-techniques","status":"publish","type":"post","link":"https:\/\/www.samuelhuntley.com\/?p=179","title":{"rendered":"Phishing Attacks: Advanced Attack Techniques"},"content":{"rendered":"\n<p>\nPhishing is an attack technique where an attacker uses fraudulent emails\n or texts, or copycats websites to get a victim to share valuable \npersonal information such as account numbers, social security numbers, \nor victim&#8217;s login user-name and password. This technique is also used to\n trick the victim into running malicious code on the system, so that an \nattacker can control the user&#8217;s system and thereby get acces to user&#8217;s \nor organization&#8217;s sensitive data. This book is an introduction for the \nreader in the world of Phishing attacks. The book focuses on the \ndifferent kinds of Phishing attacks and provides an overview of some of \nthe common open source tools that can be used to execute Phishing \ncampaigns. Red teams, pentesters, attackers, etc. all use Phishing \ntechniques to compromise a user&#8217;s machine. It is necessary for Red teams\n and pentesters to understand the various payload delivery mechanisms \nused by current threat profiles. The book then delves into the common \nPhishing payload delivery mechanisms used by current threat profiles. It\n also introduces some new and uncommon payload delivery techniques that \nthe author has used in the past to bypass and get through email filters \nas well as end-point detection systems.\n\n<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"272\" height=\"338\" src=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2018\/12\/image-5.png\" alt=\"\" class=\"wp-image-181\" srcset=\"https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2018\/12\/image-5.png 272w, https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2018\/12\/image-5-241x300.png 241w\" sizes=\"(max-width: 272px) 100vw, 272px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.amazon.com\/Phishing-Attacks-Advanced-Attack-Techniques\/dp\/1984093975\">Buy it at Amazon<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is an attack technique where an attacker uses fraudulent emails or texts, or copycats websites to get a victim to share valuable personal information such as account numbers, social security numbers, or victim&#8217;s login user-name and password. This technique is also used to trick the victim into running malicious code on the system, so &hellip; <a href=\"https:\/\/www.samuelhuntley.com\/?p=179\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Phishing Attacks: Advanced Attack Techniques<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/179"}],"collection":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=179"}],"version-history":[{"count":1,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":184,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions\/184"}],"wp:attachment":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}