Reference no: EM133014510
SBM4304 IS Security and Risk Management
LAB. Social Engineering Attack
Objective:
• Use and study and the Credential Harvester Attack under kali Linux operating system.
1) Overview of this lab
This lab demonstrates how to clone a target website and catch user credentials. One of the popular social engineering attack is to send a phishing link to the victim and tricks them to visit a website that's exactly look like a legitimate website. Once, a user logins to the clone website, the attacker can capture the user credentials.
In this lab, we will use the Social Engineering Tool (SET) at Kali Linux
We will use site cloning via Credential Harvester Attack Method to clone facebook.
2) Working Procedures
1. Open Kali Linux via virtual box and open the terminal as shown below
2. You have to login as a super user (root) using the following command:
sudo su
You have to enter the password: osboxes.org
3. Open a terminal and type setoolkit
4. Choose Social-Engineering Attacks (option 1), then choose Website Attack Vectors (Option 2), then choose Credential Harvester Attack Method (Option 3) and finally choose Site Cloner (option 2). You should see similar to the following figure.
5. Now it is asking for the IP address, where you would like to host the clone website. For the experiment purpose, we will use the IP address of your virtual machine (Kali Linux) and will host it there as shown in the figure below.
Kali Linux detects the IP address in your computer as in the figure above and suggested: [10.0.2.15]. Accept the suggested IP by pressing the enter key: .
Note, your VM may have different IP address.
6. Therefore, open another terminal use the command ifconfig to get the IP address of the computer. Please note, your IP address will be different than what is shown in the figure below.
7. After selecting the IP address, it will ask for the target website address to be cloned. For the experiment purpose, we will use Facebook website.
Testing:
8. Open the browser (Firefox ESR) under the Kali Linux as follows:
- Select that show at the top left corner of Kali Linux screen.
- At the search bar type Firefox and select Firefox ESR as shown below:
9. by selecting such as Fire fox , type the IP address suggested by the Kali Linux in step 5 such as [10.0.2.15]. Please note, your IP address may be different. Try to login to facebook as shown below:
a. Describe and compare the main types of spyware.
b. Discuss DDoS and explain its method of operations.
c. Identify and explain the main difference between virus, warm and trojan hour types of malwares.
Research to find software and hardware that can be used to hack into a computer system. Summarize your research in a table to include the name of the software, free or payed software, type of malware and it is working mechanism.
Attachment:- IS Security and Risk Management.rar
|
What are the relevant costs for Ruby
: Gem Inc. has contacted Ruby with an offer to sell 5,000 of the subassemblies for P1,350 each. What are the relevant costs for Ruby
|
|
Stages of the software engineering process
: Develop components of the Software Specification and Design Documents discussed in lectures. Student groups should be formed by Session five
|
|
Should your company replace its year-old machine
: The opportunity cost of capital for this type of equipment is 12%. Should your company replace its year-old machine
|
|
Prepare an income statement for the month of October
: Teal Mountain Inc., a provider of consulting services, was founded on October 1, 2022. Prepare an income statement for the month of October
|
|
Describe and compare the main types of spyware
: Describe and compare the main types of spyware - Discuss DDoS and explain its method of operations and Identify and explain the main difference between virus
|
|
What is the one year real rate of interest
: Treasury bills are yielding 6.87%. Based on the domestic Fisher effect (actual, not approximation), what is the one year real rate of interest
|
|
What are the equivalent units of production for conversion
: As of September 1, the beginning WIP Inventory was 45% completed as to labor and overhead. What are the equivalent units of production for conversion
|
|
Discuss potential dangers of a cyberterrorist attack
: What are the differences between cyberterrorists, hactivists, and state-sponsored attackers and Describe cyberterrorism and discuss potential dangers
|
|
What is the cost assigned to job at the end of the week
: Assignment of $500 of raw materials inventory to Job 5. What is the cost assigned to Job 5 at the end of the week
|