2024 HuntressCTF - Red Phish Blue Phish

2024-10-02

Summary

Author: Truman Kain (@truman.huntress), Adam Rice (@adam.huntress)

You are to conduct a phishing excercise against our client, Pyrch Data.

We've identified the Marketing Director, Sarah Williams ([email protected]), as a user susceptible to phishing.

Are you able to successfully phish her? Remember your OSINT ;)

NOTE: The port that becomes accessible upon challenge deployment is an SMTP server. Please use this for sending any phishing emails.

You will not receive an email/human response as the mail infrastructure for this challenge is emulated.

Steps

I started the container for the challenge and was given a hostname to connect to. Upon connecting to the system, I quickly discovered that it was an SMTP server. I also googled the hostname for the Sarah Williams, and discovered the team members for the company Team. I ran into issues with terminating the email, and found that I needed to use the -C | Send CRLF as line-ending flag. Using the same email format as SWilliams, I sent an email from each team memeber and as I enumerated through the staff, I found that I discovered the flag when the sender was Joe Daveren.

MAIL FROM:<[email protected]>
250 OK
RCPT TO:<[email protected]>
250 OK
DATA
354 End data with <CR><LF>.<CR><LF>
Subject: Immediate

.
250 OK. flag{54c6ec05ca19565754351b7fcf9c03b2}
 sent 938, rcvd 1370

Flag: flag{54c6ec05ca19565754351b7fcf9c03b2}