User Tools

Site Tools


create_a_phishing_campaign_with_malware_simulations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
create_a_phishing_campaign_with_malware_simulations [2020/05/18 07:47] – [LUCY's approach] lucycreate_a_phishing_campaign_with_malware_simulations [2020/05/18 07:54] lucy
Line 188: Line 188:
  
  
 +===== Q&A =====
 +
 +  * Do the files need to be installed? No, the files are non-intrusive, run only in the memory and have no effect on the System (no changes are made). 
 +  * Do the files need to be run with elevated permissions? No. The files can run with limited, standard windows user rights.
 +  * Our filters block file types like .exe- How can I still use the files? Use a different file format within the scenario settings (e.g. place the exe in an archive like a zip file or place it within a PDF as an attachment).
 +  * Can I run the fies on MAC or linux? No: In the current edition, the executable runs only on Windows (Windows 7/8/10). 
 +  * Windows defender blocks the files - can this be prevented? It can (using "whitelisting" inside the Windows Defender Security Center). But it is normal that defender blocks the code as defender will block any unknown code which is not officially signed. The files unfortunatly cannot be signed, as the hash value is different for each user (the files get compiled on the fly individually for each single user)
  
create_a_phishing_campaign_with_malware_simulations.txt · Last modified: 2021/12/15 13:20 by lucy