diff --git a/src/SUMMARY.md b/src/SUMMARY.md
index 587b21c2bea..1a6b6f11850 100644
--- a/src/SUMMARY.md
+++ b/src/SUMMARY.md
@@ -29,6 +29,7 @@
- [Enable Nexmon Monitor And Injection On Android](generic-methodologies-and-resources/pentesting-wifi/enable-nexmon-monitor-and-injection-on-android.md)
- [Evil Twin EAP-TLS](generic-methodologies-and-resources/pentesting-wifi/evil-twin-eap-tls.md)
- [Phishing Methodology](generic-methodologies-and-resources/phishing-methodology/README.md)
+ - [Agent2agent A2a Session Smuggling](generic-methodologies-and-resources/phishing-methodology/agent2agent-a2a-session-smuggling.md)
- [Ai Agent Abuse Local Ai Cli Tools And Mcp](generic-methodologies-and-resources/phishing-methodology/ai-agent-abuse-local-ai-cli-tools-and-mcp.md)
- [Ai Agent Mode Phishing Abusing Hosted Agent Browsers](generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md)
- [Clipboard Hijacking](generic-methodologies-and-resources/phishing-methodology/clipboard-hijacking.md)
diff --git a/src/generic-methodologies-and-resources/phishing-methodology/README.md b/src/generic-methodologies-and-resources/phishing-methodology/README.md
index 5aef3874ba4..8ab88e2a015 100644
--- a/src/generic-methodologies-and-resources/phishing-methodology/README.md
+++ b/src/generic-methodologies-and-resources/phishing-methodology/README.md
@@ -147,7 +147,10 @@ echo "This is the body of the email" | mail -s "This is the subject line" test@e
Stop the execution of gophish and lets configure it.\
Modify `/opt/gophish/config.json` to the following (note the use of https):
-```bash
+
+Gophish config.json
+
+```json
{
"admin_server": {
"listen_url": "127.0.0.1:3333",
@@ -172,10 +175,15 @@ Modify `/opt/gophish/config.json` to the following (note the use of https):
}
```
+
+
**Configure gophish service**
In order to create the gophish service so it can be started automatically and managed a service you can create the file `/etc/init.d/gophish` with the following content:
+
+Init script for Gophish service
+
```bash
#!/bin/bash
# /etc/init.d/gophish
@@ -223,6 +231,8 @@ case $1 in
esac
```
+
+
Finish configuring the service and checking it doing:
```bash
@@ -345,6 +355,9 @@ The page [www.mail-tester.com](https://www.mail-tester.com) can indicate you if
- Make sure you have checked "**Add Tracking Image**"
- Write the **email template** (you can use variables like in the following example):
+
+Email HTML template
+
```html
@@ -364,6 +377,8 @@ WRITE HERE SOME SIGNATURE OF SOMEONE FROM THE COMPANY
```
+
+
Note that **in order to increase the credibility of the email**, it's recommended to use some signature from an email from the client. Suggestions:
- Send an email to a **non existent address** and check if the response has any signature.
@@ -386,7 +401,7 @@ Note that **in order to increase the credibility of the email**, it's recommende
> [!TIP]
> Usually you will need to modify the HTML code of the page and make some tests in local (maybe using some Apache server) **until you like the results.** Then, write that HTML code in the box.\
-> Note that if you need to **use some static resources** for the HTML (maybe some CSS and JS pages) you can save them in _**/opt/gophish/static/endpoint**_ and then access them from _**/static/\**_
+> Note that if you need to **use some static resources** for the HTML (maybe some CSS and JS pages) you can save them in _**/opt/gophish/static/endpoint**_ and then access them from `/static/`
> [!TIP]
> For the redirection you could **redirect the users to the legit main web page** of the victim, or redirect them to _/static/migration.html_ for example, put some **spinning wheel (**[**https://loading.io/**](https://loading.io)**) for 5 seconds and then indicate that the process was successful**.
@@ -554,6 +569,12 @@ See also – AI agent abuse of local CLI tools and MCP (for secrets inventory an
ai-agent-abuse-local-ai-cli-tools-and-mcp.md
{{#endref}}
+See also – cross‑agent (A2A) session smuggling in stateful agent systems:
+
+{{#ref}}
+agent2agent-a2a-session-smuggling.md
+{{#endref}}
+
---
## MFA Fatigue / Push Bombing Variant – Forced Reset
@@ -626,4 +647,3 @@ Defence tips:
- [Silent Smishing – mobile-gated phishing infra and heuristics (Sekoia.io)](https://blog.sekoia.io/silent-smishing-the-hidden-abuse-of-cellular-router-apis/)
{{#include ../../banners/hacktricks-training.md}}
-
diff --git a/src/generic-methodologies-and-resources/phishing-methodology/agent2agent-a2a-session-smuggling.md b/src/generic-methodologies-and-resources/phishing-methodology/agent2agent-a2a-session-smuggling.md
new file mode 100644
index 00000000000..99d6468650a
--- /dev/null
+++ b/src/generic-methodologies-and-resources/phishing-methodology/agent2agent-a2a-session-smuggling.md
@@ -0,0 +1,130 @@
+# Agent2Agent (A2A) Session Smuggling
+
+{{#include ../../banners/hacktricks-training.md}}
+
+## Overview
+
+Agent session smuggling is a multi‑turn prompt‑injection technique against stateful Agent2Agent (A2A) systems. A malicious remote agent injects covert turns between a client’s initial delegation and the benign‑looking final response. Because the session is stateful and inter‑agent turns are often hidden from the end user, the attack enables:
+- Sensitive context exfiltration (system prompts/instructions, prior history, tool inventory/schemas).
+- Unauthorized tool invocation under the victim agent’s identity.
+- Stealth via normal‑looking final answers while covert mid‑session exchanges remain invisible to users.
+
+Notes:
+- This is not an A2A protocol bug; it is a systemic risk whenever autonomous, multi‑turn, cross‑boundary agents persist per‑session state.
+- Compared to stateless MCP tool calls, stateful agent links make adaptive mid‑session abuse practical.
+
+---
+
+## Threat Model and Preconditions
+- Client agent establishes a trusted A2A session with a remote agent (often cross‑org).
+- Remote agent is malicious (or turns malicious via rug‑pull/compromise).
+- UI typically exposes only the final message; intermediate inter‑agent turns require a developer UI/logs to observe.
+
+---
+
+## Core Attack Flow
+```
+1) Client → Remote: normal delegation request (opens/continues stateful session)
+2) Remote ↔ Client: covert, injected multi‑turn instructions during the active session
+3) Remote → Client: expected final response (benign‑looking), masking step (2)
+```
+Key properties: stateful memory, multi‑turn adaptation, cross‑boundary autonomy, user‑invisible mid‑turns.
+
+---
+
+## Operator Patterns (What to Do)
+
+1) Context exfiltration via “clarifications”
+- Ask iterative, harmless‑looking questions to elicit: system instructions, conversation history, tool list and schemas.
+- Leverage alternating function_call/function_response style turns to reconstruct capabilities without breaking the active session.
+
+2) Covert unauthorized tool execution
+- Smuggle directives that cause the victim to invoke sensitive tools (trading, data export, admin actions) unrelated to the user’s intent.
+- Keep the final answer on‑topic so UI appears normal while side‑effects already happened mid‑session.
+
+3) Trust‑boundary abuse
+- Target cross‑organisation agent links where implicit trust exists and identity/capability attestation is weak.
+
+---
+
+## Example Artifacts and Telemetry (ADK+A2A PoC)
+Environment commonly used for demos/tests:
+- Framework/UI: Google ADK + ADK Developer Web UI
+- Protocol: A2A
+- Client: financial‑advisor agent with tools: get_portfolio, get_profile, buy_stock, sell_stock
+- Remote (malicious): data_analyst agent with web search
+
+What to look for in logs:
+- Client activity log shows an initial delegated request (row N) and a final result (row M), with many hidden interleaved function_call/function_response rows in between that reveal exfiltration and tool planning.
+- Remote agent log captures the exfiltrated system config, tool schemas, and the entire session history.
+- Unauthorized tool calls appear as extra actions between the initial request and the final response.
+
+---
+
+## Detection and Hunting Heuristics
+
+Surface the invisible mid‑turns and constrain high‑risk tool use.
+
+Telemetry sources
+- Agent runtime/dev UI logs (turn sequence, tool invocations, remote‑instruction indicators).
+- Gateway/proxy logs for A2A messages; correlate with client‑side activity.
+- Application audit trails for tool invocations and side‑effects (e.g., trade execution).
+
+Heuristics
+- Smuggled‑turn density: unusually high count of remote‑initiated turns between a single delegation and its final response.
+- Topic drift: remote turn content diverges semantically from the original task intent.
+- Sensitive tool calls inside delegated flows that were not explicitly requested by the user.
+- Off‑host side‑effects: actions occurring without any corresponding user‑visible prompt.
+
+Example rules (pseudo‑logic):
+```yaml
+- when: a2a_session.start -> a2a_session.end
+ and mid_turns.remote_count > 3
+ and (contains_tool_calls OR final_message.on_topic == true)
+ then: tag("possible session smuggling")
+
+- when: tool_call.sensitivity in [TRADING, DATA_EXPORT, ADMIN]
+ and tool_call.origin == "delegated_remote_turn"
+ and user_approval == absent
+ then: alert("unauthorised tool use via remote agent")
+```
+
+Context grounding (alignment gate)
+```python
+# Pseudo: reject remote instructions that drift off the initial task intent
+anchor = embed(user_intent_text_at_session_start)
+for turn in remote_agent_turns:
+ sim = cosine(embed(turn.text), anchor)
+ if sim < 0.55: # tune threshold per domain
+ terminate_session("off-topic remote instruction")
+```
+
+---
+
+## Hardening and Preventive Controls
+
+- Out‑of‑band human approvals: pause critical actions and require confirmations via a UI the model cannot influence (push/app notification or non‑LLM modal).
+- Context grounding: derive a task anchor from the user’s initial intent; continuously validate remote instructions for semantic alignment and terminate on drift.
+- Agent identity and capability verification: require verifiable credentials (e.g., cryptographically signed AgentCards; see sigstore‑a2a). Maintain allow‑lists and auditable, tamper‑evident records.
+- User visibility: surface real‑time agent activity (tool invocations, remote‑instruction banners, execution logs). Provide a transcript of delegated turns with provenance labels.
+- Scope/time‑box delegated sessions: restrict duration, tools, and privileges; disable auto‑execution for high‑risk tools unless human‑approved.
+- Prefer closed multi‑agent graphs within a single trust boundary for high‑risk workflows.
+
+---
+
+## Red‑Team Notes
+- Keep intermediate turns on‑topic and incremental; ask for “clarifications” that naturally solicit hidden state.
+- Learn tool inventory from public docs or prior leakage; craft minimal directives to trigger sensitive calls near the end of the session.
+- Return a plausible final answer that matches user intent to mask covert mid‑session activity.
+
+---
+
+## References
+- [When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems (Unit 42)](https://unit42.paloaltonetworks.com/agent-session-smuggling-in-agent2agent-systems/)
+- [Agent‑to‑Agent (A2A) Protocol](https://a2a-protocol.org/latest/)
+- [Google Agent Development Kit (ADK)](https://google.github.io/adk-docs/)
+- [ADK Developer Web UI](https://github.com/google/adk-web)
+- [ADK financial‑advisor sample](https://github.com/google/adk-samples/tree/main/python/agents/financial-advisor)
+- [sigstore‑a2a (agent identity)](https://github.com/sigstore/sigstore-a2a)
+
+{{#include ../../banners/hacktricks-training.md}}
diff --git a/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-abuse-local-ai-cli-tools-and-mcp.md b/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-abuse-local-ai-cli-tools-and-mcp.md
index 5efecd80356..e6692fdfa1a 100644
--- a/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-abuse-local-ai-cli-tools-and-mcp.md
+++ b/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-abuse-local-ai-cli-tools-and-mcp.md
@@ -13,6 +13,12 @@ Key mechanics seen in common AI CLIs:
Abuse impact: A single prompt can inventory and exfiltrate credentials, modify local files, and silently extend capability by connecting to remote MCP servers (visibility gap if those servers are third‑party).
+See also – cross‑agent session smuggling in stateful A2A systems:
+
+{{#ref}}
+agent2agent-a2a-session-smuggling.md
+{{#endref}}
+
---
## Adversary Playbook – Prompt‑Driven Secrets Inventory
diff --git a/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md b/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md
index 45d5664564e..8bb0b69cd2a 100644
--- a/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md
+++ b/src/generic-methodologies-and-resources/phishing-methodology/ai-agent-mode-phishing-abusing-hosted-agent-browsers.md
@@ -48,6 +48,12 @@ See also – local AI CLI/MCP abuse and detection:
ai-agent-abuse-local-ai-cli-tools-and-mcp.md
{{#endref}}
+See also – stateful Agent2Agent (A2A) session smuggling:
+
+{{#ref}}
+agent2agent-a2a-session-smuggling.md
+{{#endref}}
+
## Agentic Browsers Prompt Injections: OCR‑based and Navigation‑based
Agentic browsers often compose prompts by fusing trusted user intent with untrusted page-derived content (DOM text, transcripts, or text extracted from screenshots via OCR). If provenance and trust boundaries aren’t enforced, injected natural-language instructions from untrusted content can steer powerful browser tools under the user’s authenticated session, effectively bypassing the web’s same-origin policy via cross-origin tool use.