Our Blog
2024 (10)
2023 (19)
2022 (10)
2021 (13)
2020 (30)
2019 (10)
2018 (14)
2017 (27)
2016 (22)
2015 (17)
2014 (15)
2013 (30)
2012 (27)
2011 (33)
2010 (36)
2009 (81)
2008 (75)
2007 (80)
Categories
Categories
2024 (1)
Art (1)
Edr (3)
Lsa (1)
Registry (1)
Windows (16)
Research (76)
Sqli (1)
Lfi (1)
Industrial (1)
Network (2)
Cve (6)
Network protocol (1)
Active directory (8)
Guest (1)
Null sessions (1)
Exploit (15)
Vulnerability (4)
Webapps (18)
Cve-2024-26331 (1)
Cve-2024-28269 (1)
Web application (2)
Phishing (1)
Tool (7)
Typosquatting (1)
Ctf (5)
Training (64)
Hardware (11)
Mitm (6)
Programming (21)
Techniques (1)
Callbacks (1)
Driver (1)
Hooking (3)
Kernel (2)
Rootkit (1)
Shellcodes (1)
Ssdt (1)
Winapi (1)
Rootkits (1)
Shellcode (1)
0xcon (1)
2023 (1)
Contributions (1)
Keynote (2)
Talks (5)
Defence (2)
Bsides (3)
Cape town (1)
Law enforcement (1)
Strategy (1)
Talk (1)
Conferences (93)
Physical threats (2)
Redteam (8)
Code (2)
Experiment (3)
Perf (1)
Rust (2)
Performance (2)
Bypass (6)
Csp (1)
Reversing (18)
Av bypass (1)
Reverse engineering (3)
Blackhat (46)
Defcon (10)
Ringzer0 (1)
Browser (3)
Cache (1)
Smuggling (1)
Bug bountry (1)
Footprinting (3)
Steampipe (1)
Bugbounty (1)
Containers (1)
Docker (4)
Command injection (1)
Extensions (1)
Sensecon (5)
Teardown (1)
Hashcat (4)
Knowledge-base (1)
Tools (80)
Hash-cracking (1)
Kerberos (3)
Ntlm (2)
Delegation (1)
Protected users (1)
Bitlocker (1)
Clone (1)
Virtualisation (1)
Mallet (1)
Websockets (1)
Post-exploitation (6)
Socks (1)
Adcs (1)
Rubeus (3)
Certipy (1)
Authentication (2)
Internals (8)
Token (1)
Networking (5)
Offence (1)
Vpn (1)
Hackathon (4)
Sensecon 2022 (1)
Sensecon2022 (1)
Requestsmuggling (1)
Http2 (2)
Ibm (1)
Shell (2)
Cloud (13)
Corellium (1)
Mobile (20)
Pentest (7)
Ssh (1)
Usbfluxd (1)
Cracking (4)
Fun (61)
Sim card (1)
Android (7)
Objection (4)
Windows 11 (1)
Windows subsystem for android (1)
Wsa (1)
Wsl (1)
Challenge (5)
Sensecon 2021 (1)
Rpc (1)
Vegas (1)
Wifi (12)
Nmap (3)
Basic (1)
Infrastructure (6)
Http3 (1)
Quic (1)
Account takeover (1)
Javascript (2)
Xss (1)
Chain (1)
Ios (7)
Binary (1)
Attack (1)
Pwn (1)
Duo (1)
Games (2)
Sensecon 2020 (2)
Api (1)
Json (1)
Sensecon2020 (2)
Swagger (1)
Playstation (2)
Dual-pod-shock (1)
Dualsense (1)
Dualshock (1)
Sony (1)
Stutm (1)
Av evasion (3)
Automation (1)
Coding (1)
Forpoland (1)
Email (1)
Python (10)
Encodings (2)
Passwords (2)
0day (4)
Dll hijacking (1)
Privilege escalation (1)
Grafana (1)
Hipster (2)
Pi (1)
Pihole (1)
Traefik (1)
Acl (2)
Directaccess (1)
Kerberos resource-based constrained delegation (1)
Routopsy (1)
About:us (47)
Powershell (4)
Genericwrite (1)
Rcm (1)
Blue team (1)
Digital forensics (1)
Suricata (1)
Rce (2)
Source code review (1)
#4poland (1)
Amsi (1)
Chrome (2)
Exploit development (4)
Vulnerability research (2)
V8 (2)
Dos (1)
Monitor (1)
Poc (1)
Proofofconcept (1)
Prtg (1)
Prtg network monitor (2)
Shodan (1)
Usb (3)
Anti-virus (2)
Malware (3)
Persistence (1)
Sysmon (1)
Abuse (2)
Smartcards (1)
Windows events (1)
Forgery (1)
Impersonation (1)
Smartcard (1)
Bloodhound (1)
Dacls (1)
Mimikatz (1)
Powerview (1)
Browsers (1)
Exploitation (1)
Internal (2)
Radio (1)
Real-world (20)
Rf (2)
Shells (5)
Doom (1)
Frida (4)
Sensecon 2019 (1)
Variant analysis (1)
Code analysis (1)
Cve-2019-15937 (1)
Cve-2019-15938 (1)
Ql (1)
Semmle (1)
Metasploit (5)
Meterpreter (1)
Relay (1)
Rogue-ap (5)
Cve-2019-0547 (1)
Cve-2019-0726 (1)
Dhcp (1)
Kb4480966 (1)
Patch diffing (1)
Diffing (1)
Protocol (1)
Backdoor (3)
Lsass (1)
Password (1)
Deepdive (2)
Mac (16)
Cve-2018-19204 (1)
How-to (4)
Howto (23)
Webassembly (1)
Opsec (1)
Tin-foil-hat (8)
Command execution (1)
Dns (1)
Ioc (1)
Tunnelling (2)
Heap (7)
Heap linux (7)
Heap overflow (4)
Apngopt (2)
Exploitaion (4)
Bash (1)
Curl (1)
Efficiency (1)
Mq (1)
Detection (1)
Analysis (13)
Build-it (5)
Interception (1)
Tricks (6)
Sdr (3)
Gdb (1)
Apng (1)
Double free (2)
Linux (4)
Automated network scanner (2)
Go go go (1)
Screenshot (1)
Crypto (9)
Office (1)
Burp (1)
Certificates (2)
Skimmers (1)
Materials (5)
Pwnage friday (1)
Painless (1)
Ptmalloc2 (1)
Apache server (1)
Fuzzing (1)
Httpd (1)
Afl (1)
Cve-2017-7668 (1)
Printf (1)
Ook (1)
External (1)
Troopers (1)
Empire (3)
B-sides (5)
Presentations (9)
Dll injection (1)
Maltego (6)
Snoopy (3)
Defense (3)
Blackbox (1)
Ransomware (1)
Skype (3)
Transforms (1)
Zacon (1)
Willemluvscuddles (1)
Clickjacking (2)
Hipsterlurv (1)
Jack (1)
Ssl (1)
.za (3)
Jobs (5)
Product (4)
#legit (1)
Press release (4)
Interns (1)
Broadview (4)
Xml (1)
Malware analysis (1)
44con (6)
Show-off (1)
Z-force (1)
Z-wave (1)
Infosec-soapies (26)
Local (8)
Silly-yammerings (21)
Google (1)
Memory analysis (1)
Privacy (7)
Community (21)
Surveillance (1)
Solution (1)
Rsa (1)
Secureid (1)
Crest (1)
Sap (2)
Threat modelling (6)
Rambling (2)
Uk (2)
Zaprize (2)
Auditors (1)
Metrics (3)
Risk management (2)
Vendors (7)
Metricon (2)
Report-info (1)
Uncon (2)
Windows phone (1)
Auctions (1)
Penny (1)
Pickle (4)
Consulting (1)
Policy (1)
Ccdcoe (1)
Estonia (1)
.ac.za (1)
Vulnerability management (10)
Travel (2)
Suru (1)
Memcached (2)
Management (1)
Risk (1)
Proxy (1)
Hackrack (2)
Goodbye (1)
Fail (3)
Imsojaded (2)
Pci (2)
Videos (6)
Hope? (2)
Wasc (1)
Security-news (6)
Mindless-politics (4)
Security-fyi (8)
Qo[w|m|?] (4)
Time-waster (6)
Tech-toys (3)
Zen-hacking (3)
Foos (1)
Readme (1)
Web_x.0 (2)
Mindmaps (1)
Writing-advice (1)
Close
Mail in the Middle – A tool to automate spear phishing campaigns
Reading time: ~15 min
Posted by Felipe Molina on 26 February 2024
Categories:
Phishing
,
Tool
,
Typosquatting
Context In the chilly month of December 2023, my colleagues Jason (@BreakerOfSigns), Szymon (@TH3_GOAT_FARM3R), and myself (@felmoltor) were on a...