====== DMARC ===== ===== Spoofing ===== From [[https://www.linkedin.com/posts/terry-dunlap_cybersecurity-hacking-informationsecurity-ugcPost-7175850765771513856-ZZSg/|this LinkedIn post]] How to spear phish someone in 2024 even if SPF is enabled and active * Verify Target's DMARC "p" flag is set to "none" (many are!) * Buy a closely related official-sounding domain name (~ $12) * Create a Linux VM or cloud-based VPS * Verify port 25 outbound traffic is permitted (some clouds block it) * Install Postfix * Configure your domain's A and SPF records in DNS * Craft your phishing email * Connect to your Postfix mail server * Copy and paste your message * Send dig @1.1.1.1 TXT _dmarc.grayhatacademy.com ; <<>> DiG 9.16.38 <<>> @1.1.1.1 TXT _dmarc.grayhatacademy.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 1585 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 1232 ;; QUESTION SECTION: ;_dmarc.grayhatacademy.com. IN TXT ;; ANSWER SECTION: _dmarc.grayhatacademy.com. 600 IN TXT "v=DMARC1; p=quarantine; rua=mailto:terry@grayhatacademy.com; pct=100; sp=none; adkim=r; aspf=r" ;; Query time: 31 msec ;; SERVER: 1.1.1.1#53(1.1.1.1) ;; WHEN: Mon Mar 25 20:47:16 GMT Standard Time 2024 ;; MSG SIZE rcvd: 161 'v=DMARC1; p=none;...'' is what you are looking for