Become a social engineer with Kaburra

In this post, I will use the Kaburra toolset and MS Word to conduct a spear phishing attack test on a hypothetical user within the network.

This also helps the IT team gain more experience in understanding how to prevent phishing attacks in daily operations.

1. How to use the Kaburra toolset.

You can download and install it according to the instructions from the GitHub page: https://github.com/2x7EQ13/Kaburra

kaburra spear-phishing simulation
The GUI of Kaburra will have the following main sections:
 
Kaburra home main window
Kaburra Home Main Window

Block 1: This is the section for adding target emails. We see three buttons: Add, Remove, and Bulk Add. With Bulk Add, it will be a file containing a list of email addresses, each on a separate line.

Block 2: This is the section to configure the information used for the email account you are using to send emails to the targets. Additionally, there is a URL to the Tracking Server that you have set up (refer to the Install section of Kaburra). The information in these sections will be saved, so the next time you open it, you won’t need to enter it again. Note that you should always click "Check" to ensure everything is functioning smoothly.

After filling in the information in the Sender group, click "Check" If everything is functioning properly, an icon indicating completion will appear.

Kaburra Tracking Server and Sender Setting
Kaburra Tracking Server and Sender Setting

If there are any issues, you can review and resolve them based on the log information that is printed out.

Kaburra Log Window
Kaburra Log Window

Block 3: This is the section that contains the information about the fake email you will send: including Subject, Body, and Attachments. The Body is an HTML file; you can use any HTML Editor software, or use MS Word as I will do below.

Be aware that the "Delay Time" is the duration to pause before sending to the next email address in the target list. Different mail servers will limit the number of emails that an account can send in one minute, one hour, or similar timeframes.

Block 4: This is the section for you to preview the content of the email that will be sent.

The tabs such as Sent, Result, and Statistic, I will leave for you to explore their functions on your own.

Suppose I want to recreate a phish testing scenario impersonating HSBC Bank; the displayed information would be as follows:

Fake Email Info Setting
Fake Email Info Setting

You must always have the consent of a legal representative from the company or organization involved. Otherwise, sending emails like this is illegal.

After clicking "Send" an email with the specified Subject and Body will be sent. The attachment in this case is a .doc file containing VBA code.

You can select multiple target email addresses inside "Block 1" to send bulk fake emails to the chosen addresses.

Fake Email received by target
Email received by target

Fake Email Opened by target
Email Opened by target

When the target opens the email, opens the attachment, and selects 'Enable Content' the system will automatically update in the Result page. This section contains all the information about the fake emails that have been sent out.

Sent Fake Mails result
Sent Fake Mails result


The tracking information will include the Subject of the email, the time, and the target's IP address. If the "Exec" field is left blank, it indicates that the target only opened the email.

2. How to create an email body using MS Word

  1. Draft the content of the email.
  2. Select the File menu, then choose Save As.
  3. In the "Save as type" section, select "Web Page, Filtered (*.htm, *.html)".
  4. Click Save to finish.
  5. Import saved file into Kaburra

I hope you can set up and conduct phishing attack tests on your own without spending too much budget on expensive tools like KnowBe4, Wizer, etc.

Comments