Dagah Software

Click the button below to go directly to the download page.

Dagah Pilots

Click the button below to download the Dagah Information Flyer.

Dagah Flyer

With Dagah, security analysts can design a campaign of penetration test attacks against targets, launch them, and review the results.  Attacks simulate phishing, harvesting, iOS profile, and malicious application exploitations.  Each attack can be delivered over Short Message Service (SMS), Quick Response (QR) Codes, Near-Field Communications (NFC), or messaging applications.

SMS attacksyesyes
NFC attacksyesyes
QR Code attacksyesyes
Messaging Apps attacksnoyes
Basic phishingyesyes
Harvester phishingyesyes
Android Agent post exploitationnoyes
iOS Agent post exploitationnoyes

The software consists of four components:

  • An Android Application for the Penetration Tester that bridges the engine to the cellular network for sending SMS and broadcasting via NFC.  A Twilio account can be substituted for the Android Application for sending SMS messages.
  • Android and/or iOS Agents (simulated malicious applications) for targeted phones
  • Server-based engine: which can be interfaced via command line interface (CLI)
  • A web-based GUI: which can be interfaced via a browser

A penetration tester designs CAMPAIGNs consisting of ATTACKs and runs them against TARGETs. Targets are phone numbers. Any number of attacks can be run within a campaign and a campaign can be run against a set of targets.

Attacks are of a type:

  • Basic Phishing: Simulating phishing to draw mobile users into following a link
  • Harverster: Simulating a phishing attack to draw mobile users to a fake website to harvest their user credentials
  • Agent: Simulating a phishing attack to trick users into side loading a “malicious” application containing a backdoor remote agent
  • Client Side: Exploiting mobile devices with client-side vulnerabilities
  • Agent: Simulating a phishing attack to trick users into side loading a settings profile or trust chain to the iPhone.

Each attack can be delivered via four methods:

  • SMS: Text messages
  • QR Codes: A graphic image that contains an encoded URI that can be printed and displayed
  • NFC: A broadcast message that can be received by nearby mobile devices taking them to a URI
  • Messaging Apps Text messages over messaging applications like Twitter or WhatsApp.
  • EXTERNAL: A message delivered outside of dagah such as via emails

A campaign is designed, staged, and then run against groups of targets. The same campaign can be run against another group of targets later for A/B testing.  Results are reported per campaign.

For all attacks using SMS or NFC methods, a “modem” is used to bridge to the mobile network. The DagahModemBridge application will need to be installed on a penetration tester’s mobile device and configured to connect to the engine. All SMS and NFC methods will appear to be coming from the phone number of the mobile device running the modem application.