While some pen testing companies who do that want to make it as realistic as possible (phishing emails, eg in the same manner a villain would do) it depends on the target employees that they are trying to 'phish' test..

Normal employees are not sophisticated, and the content alone is enough.

Unless the pen testing company was testing another security company, or very tech savvy targets, I would do the following:

* Add a TXT record clearly showing the purpose.
* Use a separate domain/sub-domain
* Have the PTR record from the sending server CLEARLY spell out.
        -- PTR pentest.legitimatedomain.com
* Ensure that there is an ab...@phishdomain.com
* Have accurate SWIP/rwhois for the IP in question, with clear COMMENT section
* Have the whois record for the phishdomain clearly show legitimacy
* Have an associated website matching the phishdomain.

However, in general the later is probably part of the pen test. Simply going to the site, might actually be the exploit, or it might add to the legitimacy.

A tough one.. but I would really suggest that you get a legal disclaimer from the target company, with the ability to confirm that the target indeed registered the disclaimer.

But of course, the 'obvious' question, is why they are looking to use your network ;) If they are a pen testing company without their own IP space, did they just set up shop?

Social Engineering can be used just as easily against you, as the targets.. Sounds like something a Kevin Mitnick might invent..



On 17-08-01 02:37 PM, David Harris wrote:
Hi,

We have a potential customer in the business of doing penetration testing, and 
they want to send penetration testing phishing emails authorized by a target 
company to that company's own employees.

If we allowed this in our network, I would require:

(1) Evidence to our satisfaction that this was authorized by the target company

(2) An X- header explaining what they are doing with a link to find more info

(3) Use of a from address at a domain name like 
“whatever-company-name-is-phishing.com” -- which would have a web-page 
explaining what they do

(4) The approval of our upstream's Abuse Desk.

I’m considering also requiring:

(5) Emails must be DKIM signed with a d= of the target company domain name.

For example:

From: f...@whatever-company-name-is-phishing.com
To: emplo...@example.com
DKIM-Signature: … d=example.com ….

Thoughts? Are there best practices for something like this?

Thanks,

David Harris


_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop




--
"Catch the Magic of Linux..."
------------------------------------------------------------------------
Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
------------------------------------------------------------------------
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.
------------------------------------------------------------------------
604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to