Skip to the content.

Attack Flow

Obtaining IP Address | DoS attack | Phishing | Reverse-shell attack | Manipulating files

1. Obtaining Victim’s IP Address Through Phishing

  1. Create an accound for a free website hosting service.

  2. Extract the IP_Finder.ZIP (Source codes) and upload the two files ip.php and ip_log.txt to the root folder of your hosting account.

  3. Rename the ip.php to index.php.

  4. Set the permission to 777 on ip_log.txt.

The phishing email:

Hi Mr. Fahmi,

Thank you for connecting with me at the Engineering Event last week. It was a pleasure speaking with you about the latest technology. To follow up on our conversation, I would like to hear your input on this latest news.

I would like an exchange of opinions regarding it!

Regards,
Tommy

Email 1

2. DDoS to a company’s computer to cause slow network traffic with LOIC

3. Send a phishing email with the ‘Network Diagnostic Tool User Guide’ to offer a solution to the slow traffic

Subject: ACTION REQUIRED: Irregular Internet Activity Detected
Date: 19 Feb 2021 05:37:51 -0800
From: Security Notice it-services@support.ipear.com

Dear Fahmi,

As a precautionary measure we have restricted access to your account due to irregular internet activity detected.

Please run the attached Internet Diagnostic Tool to resolve the issue.

The Internet Diagnostic Tool User Guide is attached below.

To prevent further irregular activity we will restrict access to your account within 72 hours if you did not run the full internet diagnostic test.

To ensure your account is protected at all times, we ask you to complete the following steps:

Check that all your computers and mobile devices used to access your account have an up-to-date virus scanner to detect any possible malware.

Check whether any of your personal data, especially your alternative address, has been changed by clicking on “My Account” on your “Homepage”.

Go to your “Email settings” then click on “Filter rules” to check whether any forwarding rules have been created. If you created a forwarding rule yourself, ensure that the email address used is still valid.

Thank you for your cooperation.

Sincerely,
iPear Support

iPear | Support | Privacy Policy
Copyright ©2022 Secured Service. 50 Nanyang Ave, Singapore 639798
All rights reserved.

Email

4. Gain access to the computer and navigate through the computer’s directories

5. Upload whatever files we want to file.io

6. Delete the files on the computer

7. Find another company as our target to attack

8. Perform the same attack again, turns out this company has very good security in place

9. End of our skit