Conducting Spearphishing Simulation Campaign
Overview
Spearphishing simulation is a targeted social engineering attack vector used by red teams to gain initial access. Unlike broad phishing campaigns, spearphishing uses OSINT-derived intelligence to craft highly personalized messages targeting specific individuals. This skill covers developing pretexts, building payloads, setting up email infrastructure, executing the campaign, and tracking results.
Objectives
- Develop convincing pretexts tailored to specific target personnel
- Create weaponized payloads that bypass email security controls
- Set up email delivery infrastructure with proper SPF/DKIM/DMARC configuration
- Execute phishing campaigns with real-time tracking and metrics
- Document results for engagement reporting and security awareness improvement
MITRE ATT&CK Mapping
-
T1566.001 - Phishing: Spearphishing Attachment
-
T1566.002 - Phishing: Spearphishing Link
-
T1566.003 - Phishing: Spearphishing via Service
-
T1598.003 - Phishing for Information: Spearphishing Link
-
T1204.001 - User Execution: Malicious Link
-
T1204.002 - User Execution: Malicious File
-
T1608.001 - Stage Capabilities: Upload Malware
-
T1608.005 - Stage Capabilities: Link Target
-
T1583.001 - Acquire Infrastructure: Domains
-
T1585.002 - Establish Accounts: Email Accounts
Implementation Steps
Phase 1: Pretext Development
- Review OSINT findings for target personnel profiles
- Identify current organizational events (mergers, projects, new hires)
- Select pretext theme (IT helpdesk, HR benefits, vendor communication, executive request)
- Craft email templates with appropriate urgency and authority cues
- Create landing pages that mirror target organization's branding
Phase 2: Payload Development
- Select payload type based on target security controls:
- HTML smuggling for email gateway bypass
- Macro-enabled documents (if macros not blocked)
- ISO/IMG files containing LNK payloads
- OneNote files with embedded scripts
- QR codes linking to credential harvesting pages
- Test payload against target's known security stack
- Implement payload obfuscation techniques
- Configure callback to C2 infrastructure
Phase 3: Infrastructure Setup
- Register convincing look-alike domain
- Age domain and build reputation (minimum 2 weeks recommended)
- Configure SPF, DKIM, and DMARC records
- Set up SMTP relay with GoPhish or custom mail server
- Deploy credential harvesting pages with SSL certificates
- Configure tracking pixels and click tracking
Phase 4: Campaign Execution
- Send test emails to verify delivery and rendering
- Launch campaign in waves (avoid mass sending)
- Monitor email delivery rates and opens in real-time
- Track link clicks and credential submissions
- Deploy payloads to users who interact with phishing emails
- Capture screenshots and evidence for reporting
Phase 5: Post-Campaign Analysis
- Calculate campaign metrics (delivery rate, open rate, click rate, credential capture rate)
- Identify users who reported phishing to SOC
- Document bypass of email security controls
- Map successful compromises to MITRE ATT&CK
- Compile findings for engagement report
Tools and Resources
| Tool |
Purpose |
License |
| GoPhish |
Phishing campaign management |
Open Source |
| Evilginx2 |
Real-time credential harvesting with MFA bypass |
Open Source |
| King Phisher |
Phishing campaign toolkit |
Open Source |
| SET (Social Engineering Toolkit) |
Multi-vector social engineering |
Open Source |
| Modlishka |
Reverse proxy phishing |
Open Source |
| CredSniper |
Credential harvesting framework |
Open Source |
| Fierce Phish |
Phishing framework |
Open Source |
Validation Criteria