• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / infosec / Guide to a Successful Phishing Attack

Guide to a Successful Phishing Attack

23/02/2021 19:27 by Anastasis Vasileiadis

As a penetration tester, there will be times when your customers' demand will be to carry out social engineering attacks on their employees, in order to check if they follow the company's policies and security controls.

11 - Guide to a Successful Phishing Attack

Ultimately, if a hacker fails to gain access to a system, then he can try alternative ways to gain access, such as social engineering attacks.

In this guide we will see how we can use one Credential Harvester Attack Vector to obtain valid passwords.

The first thing we need to do is connect our computer to the company network where we need to carry out the Social Engineering attack. When our computer receives a valid IP address from the DHCP server, we are ready to launch our attack.

To start SEToolkit on Kali linux, just type “setoolkit”In your terminal window.

setoolkit1 - Guide to a Successful Phishing Attack

We will use Website Attack Vectors, because according to our attack scenario, we need to control how vulnerable our client's employees are to phishing attacks.

setoolkit2 - Guide to a Successful Phishing Attack

We will use Credential Harvester Attack method because we want to get the credentials of the employees.

setoolkit3 - Guide to a Successful Phishing Attack

As we can see in the next image, SET gives us 3 options (Web Templates, Site Cloner and Custom Import).

In this case we will use the option "Web Templates", Which has some ready-made web templates that we can easily use.

setoolkit4 - Guide to a Successful Phishing Attack

Now we need to enter our IP address where we want to receive all POST requests.

setoolkit5 - Guide to a Successful Phishing Attack

In the last step, you have to choose the Web template of our choice and in this case, we will choose Facebook, because it is one of the most popular social networking platforms.

setoolkit6 - Guide to a Successful Phishing Attack

So it's time to send our internal IP to users in the form of a website (like http://192.168.179.160). This can be done through fake emails pretending to come from Facebook and asking users to log in to continue.

If a user reads the email and clicks on our link (which is our IP address), they will see the Facebook login page.

Let's see what happens if the victim enters his credentials…

setoolkit7 - Guide to a Successful Phishing Attack

As we can see from the moment our victim submits his / her credentials to the fake website, SET will send us his / her e-mail address as well as his / her password. This means that the attack method was successful.

If many users enter their credentials on our fake website, then it is time to inform our customer to re-evaluate their security policy and take additional action against this type of attack.

 

Conclusion:

  • In the scenario that the user logged in to their account, our attack was 100% successful, but even if the user does not log in with their email and password, the attack is still successful because it is in the process of opening a site from an unreliable source.
  • This means that if the site had some malware, then it would have infected its computer because the user simply ignored the company's security policy and opened an unreliable link. Thus, the company should provide the necessary training to its employees in order to have a clear understanding of the risks they face.
  • Employee training is one of the most important steps, because even if your organization uses the latest anti-phishing software on a daily basis, employees could be the weakest link, opening a link from an unknown source. Employees of a company should know what phishing is, so as not to open links and put their data in dangerous forms and should always check the address bar of the pages, to avoid possible scams.
  • Always remember that an admin can fix a computer, but it can not do much about human weaknesses.

Stay safe!

Guide to a Successful Phishing Attack was last modified: 23 February, 2021, 7: 27 pm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: infosecDay: hack, penetration, social, tester:

You May Also Like

microplastics
Hacker tried to poison the water of an entire city in Florida
Hack with Ngrok, Msfvenom and Metasploit Framework
CDK: Penetration Toolkit for Containers

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « MITM Attack Guide to LAN
Next Post: Adware: How can it steal your personal data? »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.