• Advertise
  • SS7 Hacking
Friday, January 27, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Inout Homestay 2.2 SQL Injection

    Active eCommerce CMS 6.5.0 Cross Site Scripting

    ERPGo SaaS 3.9 CSV Injection

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

    GoTo’s LastPass Breach: Encrypted Customer Data Taken

    GoTo’s LastPass Breach: Encrypted Customer Data Taken

    Top FinTech API Security Challenges

    Top FinTech API Security Challenges

    Micorosft down – Xbox Azure, MS365, and MS Teams

    Wireshark 4.0.3 is now available – What’s new?

  • Advertise
  • Home
  • Exploits

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Inout Homestay 2.2 SQL Injection

    Active eCommerce CMS 6.5.0 Cross Site Scripting

    ERPGo SaaS 3.9 CSV Injection

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

    GoTo’s LastPass Breach: Encrypted Customer Data Taken

    GoTo’s LastPass Breach: Encrypted Customer Data Taken

    Top FinTech API Security Challenges

    Top FinTech API Security Challenges

    Micorosft down – Xbox Azure, MS365, and MS Teams

    Wireshark 4.0.3 is now available – What’s new?

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Kali Linux

Squarephish – OAuth Device Code Authentication Flow & QR codes

by Ineedhack
December 26, 2022
in Kali Linux
0
80
SHARES
501
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

SquarePhish is an advanced phishing tool. It uses a combination of the OAuth Device authentication flow with QR codes.

provides more information on OAuth Device Code flow to phishing attacks.

 

Attack Steps

A SquarePhish module can be used by an attacker to send malicious QR code emails to victims. To continue to use mobile email, the default pretext is for the victim to upgrade their Microsoft MFA authentication. Microsoft Authenticator App is currently used as the client ID.

The attacker may avoid initiating the OAuth Device Code flow prematurely by sending the QR code before the attack. This only lasts for 15 minutes.

With their smartphone, the victim can scan the QR code in the email with the device. With their mobile device, the QR code will take them to an attacker-controlled server that runs the server module at SquarePhish.

A background process triggers when the victim logs in to the SquarePhish server. This will initiate the OAuth Device Code authentication flow. The victim will then be emailed a Device Code that they will need to use on the official Microsoft Device Code website. (This will set the OAuth Device Code flow for 15 minutes).

SquarePhish will continue polling for authentication while the server is in background.

[2022-04-08 14:31:51,962] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:31:57,185] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:02,372] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:07,516] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:12,847] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:17,993] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:23,169] [info] [[email protected]] Polling for user authentication... [2022-04-08 14:32:28,492] [info] [[email protected]] Polling for user authentication... 

After clicking the link in the email, the victim can visit the Microsoft Device Code authentication website via redirection from their SquarePhish URL.

After entering the Device Code, the victim will be asked for permission.

Once the victim has authenticated and consented, an authentication token will be saved locally. This token allows the attacker to access the application’s defined scope.

[2022-04-08 14:32:28,796] [info] [[email protected]] Token info saved to [email protected]

Current scope definition:

"scope”: ".default off-line_access profile openedid"

Use

Important: Make sure to update the file with Required.

Email Module

To trigger OAuth Device Code flow, send the victim a QR code generated.

 use: squish.py mail [-h][-c CONFIG][--debug] [–e EMAIL] Optional arguments: h, --help display this help message, exit -c CONFIG, squarephish config files [Default: settings.config] --debug Enable server debugging -e EMAIL,email EMAIL victim Email address for initial QR code email to                HTML1­     

Server Module

A server will point to the generated QR code and, upon request, will activate OAuth Device Code flow.

use: squish.py [-h][-c CONFIG][--debug] Optional arguments: --help display this help message, exit --c CONFIG, squarephish configuration file. [Default: settings.config] --debug server debugging

Configuration

The files contain all the relevant settings that can be modified. There are several bits of information required that the user must fill out. These include SMTP_EMAIL and SMTP_PASSWORD. In-line comments have provided documentation for all configuration options in the settings file.

NOTE The SQUAREPHISH_ configuration values in the EMAIL section should be identical to the ones used when SquarePhish is running.

[DEFAULT] SMTP_PORT = 465 # SMTP port, defaulted to 465 SMTP_SERVER = "smtp.gmail.com" # SMTP server, defaulted to GMail SMTP_PROTO = "ssl" # SMTP protocol: ssl, tls, None (leave empty) SMTP_EMAIL = "" # Provide authenticating email address here SMTP_PASSWORD = "" # Provide authenticating password here [EMAIL] SQUAREPHISH_SERVER = "" # Required: Provide IP address/domain name of hosted SquarePhish server SQUAREPHISH_PORT = 8443 # Hosted SquarePhish server port, defaulted to 8443 (this should match the below server value) SQUAREPHISH_ENDPOINT = "/mfa" # Hosted SquarePhish endpoint to trigger OAuth Device Code flow, defaulted to an MFA pretext (this should match the below server value) FROM_EMAIL = "[email protected]" # Default FROM address when sending an email SUBJECT = "ACTION REQUIRED: Multi-Factor Authentication (MFA) Update" # Default SUBJECT when sending an email, defauled to an MFA pretext EMAIL_TEMPLATE = "pretexts/mfa/qrcode_email.html" # Email body template for QR code email to victim [SERVER] PORT = 8443 FROM_EMAIL = "[email protected]" # Default FROM address when sending an email SUBJECT = "ACTION REQUIRED: Multi-Factor Authentication (MFA) Update" # Default SUBJECT when sending an email, defauled to an MFA pretext CLIENT_ID = "4813382a-8fa7-425e-ab75-3b753aab3abb" # Authenticating client ID, defaulted to Microsoft Authenticator App ENDPOINT = "/mfa" # Hosted endpoint to trigger OAuth Device Code flow, defaulted to an MFA pretext CERT_CRT = "" # Server SSL certificate .crt file CERT_KEY = "" # Server SSL certificate .key file EMAIL_TEMPLATE = "pretexts/mfa/devicecode_email.html" # Email body template for device code email to victim PERMISSION_SCOPE = ".default offline_access profile openid" # OAuth permission scope - https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent 

Custom Pretexts

The folder contains the currently pre-defined pretexts.

You can create custom pretexts by using the template from the /iphone/ folder. Both the original QR code email and the follow-up device code email require an email template.

Important SquarePhish can use this information to generate emails with the right data (QR code and/or device value).

OPSEC

The HTML file defines several HTTP response headers. These headers can be used to replace any Flask response headers and provide a better ‘legitimate response’ from the server. You can modify, remove or add headers to improve OPSEC.

 "vary": "Accept-Encoding", "server": "Microsoft-IIS/10.0", "tls_version": "tls1.3", "content-type": "text/html; charset=utf-8", "x-appversion": "1.0.8125.42964", "x-frame-options": "SAMEORIGIN", "x-ua-compatible": "IE=Edge;chrome=1", "x-xss-protection": "1; mode=block", "x-content-type-options": "nosniff", "strict-transport-security": "max-age=31536000", 
Tags: android hackingfacebook hackshacking softwarehacking tipshacking toolshacking tools kalihacking tutorialskalikali hackingkali linuxkali linux tutorialskali toolssms intercept
Ineedhack

Ineedhack

Next Post

Hackers Use Automated Attacks to Exploit Exchange Server and SQL Injection Viabilities

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

Online Food Ordering System 2.0 SQL Injection

2 weeks ago

Kali Linux again in AWS Cloud

6 years ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise