Phishious Secure Email Gateway (SEG) Evaluation Toolkit
Phishious Secure Email Gateway (SEG) Evaluation Toolkit

Phishious: Secure Email Gateway (SEG) Evaluation Toolkit

Phishious is an open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers developed by the team at https://caniphish.com. It provides the ability to see how various Secure Email Gateway technologies behave when presented with phishing material.

Secure Email Gateways Supported:

Secure Email Gateways Supported by Phishious
Secure Email Gateways Supported by Phishious

Why use Phishious?

We’re not joking when we say that Phishious is a world first in Secure Email Gateway evaluation. There is currently no other tool available (free or paid) that provides you the ability to scan your phish against an array of Secure Email Gateways. The closest utility is VirusTotal, however this specifically focuses on Malware detection and not Spam/Phish detection.

Through use of Phishious, you’ll be able to freely test your phishing material against the world’s most popular Secure Email Gateways. This is an invaluable capability as it provides you an indication of how successful your phishing campaign may be.

"
"

How does Phishious work?

Phishious exploits a common misconfiguration where many organisations broadcast overly sensitive information in email bounce responses and non-delivery reports. The sensitive information typically comes in the form of original untampered inbound message headers.

By feeding this information into Phishious, it can extract the relevant information and detect when an email is likely to end up in a targets junk folder or be completely blocked by the SEG. When we scale this across many targets, we’re able to aggregate this information to provide a holistic view on how various SEGs behave when delivered certain phishing material.

To better understand email bounce attacks and the resulting issues, please read the following Blog Post, watch this BSides Canberra presentation or watch the below introduction video on youtube.

Setup

Requirements

Windows 10 Endpoint, Windows Server 2012+ or any Linux system capable of running .NET Core 5.0 (see https://dotnet.microsoft.com/download/dotnet/5.0)

Phishious is a .NET Core 5.0 MVC Web Application. Accordingly it can be run on Windows using IIS or Linux using Apache as the Web Server. However the simplest way to use Phishious is to clone the project and then Debug it using your favourite IDE (e.g. Visual Studio, Visual Studio Code, Rider, etc.).

How to use Phishious (Automatic)

Documentation is underway. Please check the GitHub project regularly for an update. The automated scan adds an orchestration layer whereby Phishious automatically sends emails, ingests bounce responses and analyses mail headers with only a few clicks from you as the user. The main exercise on you as the user is to identify vulnerable mail receivers.

Phase 1: Identification of Vulnerable Mail Receivers

As Phishious is designed to abuse public infrastructure, you need to identify a variety of targets who use differing mail security technologies (e.g. Target 1 uses Sophos PureMessage, Target 2 uses Cisco IronPort, etc.). Identification of Vulnerable Mail Receivers can be found through manual analysis (e.g. CanIPhish Supply Chain Analysis or CanIPhish Global Historic Search which requires an account on CanIPhish to access.) or programmatic means (e.g. CanIPhish Supply Chain API).

Reference: The accompanying images are of a CanIPhish Supply Chain Scan which shows a vulnerable ‘Mail Receiver Supply Chain’ and a Global Historic Search filtering for a Vulnerable Mail Receiver

"
"
Mail Receiver Supply Chain  by Phishious
Mail Receiver Supply Chain by Phishious
Global Historic Search by Phishious
Global Historic Search by Phishious

Phase 2: Phishious Settings

Target Settings. Input target domains seperated by a space, line or comma. Follow this up by inputing a non-existent address into the local part address

SMTP Settings. Input the SMTP server settings you plan on using. Note: If using Gmail then use a throwaway Gmail address with “Less secure app access” enabled. This setting can be toggled by clicking here – https://myaccount.google.com/lesssecureapps Also for Gmail, the username and password are your gmail email address and password.

Storage Scan Settings. Input the location where the email bounce responses will land. At current, both Gmail and Amazon S3 are supported as storage destinations. For use of Amazon S3, you will likely need to setup some form of forwarding capability to forward bounce responses to this location (e.g. Amazon SES Mail Receiver with S3 as the destination).

Email Priming Settings. Input your sending email address, display name and a non-malicious subject and email body. Email priming is used to baseline normal behaviour of the respective Secure Email Gateway technologies, so we can analyse the delta from this when we deliver our malicious mail.

Once all settings have been provided, click ‘Save Settings’ followed by ‘Prime Filters’. Wait up to a minute for Priming to complete.

Phase 3: Filter Detonation

Time to email malicious content to those same targets emailed during Priming.

Step 1. Input your sending email address, display name and a malicious subject and email body.

Step 2. Click ‘Detonate Filters’. Wait up to a minute for Detonation to complete.

Phase 4: Results Analysis

Analyse the results to determine whether your phishing material was blocked or remained undetected. Click ‘View Detail’ to gain insight into what text was analysed within the Email Headers and how this impacted the overall Phishious assessment.

Reference: The accompanying images show the detailed view of two seperate SEG technologies. This view shows how Phishious analysed Email Headers to provide two seperate results from a single Phishing Email.

Phishing detection by Trend Micro HES
Phishing detection by Trend Micro HES
Phishing blocking by Exchange Online Protection
Phishing blocking by Exchange Online Protection

How to use Phishious (Manual)

Phase 1: Identification of Vulnerable Mail Receivers

As Phishious is designed to abuse public infrastructure, you need to identify a variety of targets who use differing mail security technologies (e.g. Target 1 uses Sophos PureMessage, Target 2 uses Cisco IronPort, etc.). Identification of Vulnerable Mail Receivers can be found through manual analysis (e.g. CanIPhish Supply Chain Analysis or CanIPhish Global Historic Search which requires an account on CanIPhish to access.) or programmatic means (e.g. CanIPhish Supply Chain API).

Reference: The accompanying images are of a CanIPhish Supply Chain Scan which shows a vulnerable ‘Mail Receiver Supply Chain’ and a Global Historic Search filtering for a Vulnerable Mail Receiver

Mail Receiver Supply Chain  by Phishious
Mail Receiver Supply Chain by Phishious
Global Historic Search by Phishious
Global Historic Search by Phishious

Phase 2: Filter Priming

Step 1. Email non-malicious content to a non-existent address at various target domains where a bounce attack vulnerability exists and a known Secure Email Gateway (SEG) is in-use.
Note: At this stage, only Amazon SES and Gmail have been tested for the receipt of bounce responses. Do not use Exchange Online.

Reference: The accompanying image is of an email (within Gmail) directed towards non-existent addresses at 15 targets. Each target was uniquely identified and selected for their differing Secure Email Gateway technologies.

Email Supply Chain Analysis for Filter Priming
Email Supply Chain Analysis for Filter Priming

Step 2. Wait 180 seconds. Download all received bounce responses and then upload them to Phishious for Filter Priming. Upon Priming, you will see the status of all Secure Email Gateway technologies identified. For filter detonation (Phase 3), only these technologies will be targeted.

Reference: The accompanying images show the email bounce responses being uploaded to Phishious and then the observed result of Filter Priming.

Phishious rebound answers
Phishious rebound answers
Filter Priming Results by Phishious
Filter Priming Results by Phishious

Phase 3: Filter Detonation

Step 1. Email malicious content to a non-existent address at the same target domains emailed in Phase 2.
Note: At this stage, only Amazon SES and Gmail have been tested for the receipt of bounce responses. Do not use Exchange Online.

Reference: The accompanying image is of an email (within Gmail) directed towards the same non-existent addresses at targeted in Phase 2. Each target was uniquely identified and selected for their differing Secure Email Gateway technologies.

Redirected e-mail for Filter Detonation
Redirected e-mail for Filter Detonation

Step 2. Wait 180 seconds. Download all received bounce responses and then upload them to Phishious for Filter Detonation. Upon Detonation, you will see the status of all Secure Email Gateway technologies identified and whether the phish was blocked or remained undetected.

Reference: The accompanying images show the email bounce responses being uploaded to Phishious and then the observed result of Filter Detonation.

Bounce Email Responses by Phishious
Bounce Email Responses by Phishious
Phishing detection and filtering
Phishing detection and filtering

Phase 4: Results Analysis

Analyse the results to determine whether your phishing material was blocked or remained undetected. Click ‘View Detail’ to gain insight into what text was analysed within the Email Headers and how this impacted the overall Phishious assessment.

Reference: The accompanying images show the detailed view of two seperate SEG technologies. This view shows how Phishious analysed Email Headers to provide two seperate results from a single Phishing Email.

Phishing detection by Trend Micro HES
Phishing detection by Trend Micro HES

Find a bug? Want more features? Find something missing in the documentation? Let us know! Please don’t hesitate to file an issue and we’ll get right on it.

Dark Mode

Phishious (this link opens in a new window) by Rices (this link opens in a new window)

An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.