This repo contains a digitized version of the course content for CYBR3600 (Information Security Policy) at the University of Nebraska at Omaha.
This project is maintained by MLHale
This exercise is to explore the tools of the trade in social engineering attacks.
Thursday December 6th at 1:30pm.
You should install the Social Engineering Toolkit (SET), create a credential harvester, capture some (of your own) user data, create a phishing attack, link the credential harvester to the attack. For each task, take screenshots of your activities.
It is absolutely not ok to attack anyone for any reason. Using this tool for any purpose other than your own education and training is strictly prohibited by the policies of this course and University as well as local, state, and federal law. The purpose of the exercise is for you to learn about adversary tactics so that you can counter them through policy, education, and training.
This part should be easy if you completed the XACML exercise.
Type
docker pull mlhale/set
either in terminal (for docker community edition users) or in docker cli (for docker toolbox users)
If you did not install docker before, you can do it now, or you can install SET directly:
For UNIX users this translates to:
sudo apt-get install -y curl
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
apt-get --force-yes -y install git apache2 python-requests libapache2-mod-php \
python-pymssql build-essential python-pexpect python-pefile python-crypto python-openssl
Once installed, you can invoke set from docker using the following command:
docker run -it -p 8888:80 mlhale/set bash
Note if you are using docker toolbox, you must execute this from the docker-cli and then, using virtualbox, forward the port as you did in the XACML lesson.
In the container then type:
setoolkit
Follow on screen options according to the exercise you are following. Each is coded by number.
Those not using docker, may just do the latter from their local host terminal.
This will show you one of the most common tools used by social engineers and malicious actors to dupe you into falling prey to attack.
For the credential harvester show that you cloned a site by showing its web address and the interface. Type in credentials on your local host, and then submit the login button. Try several sites like facebook.com, twitter.com, and others. Take a screenshot of the password being collected in SET.
Try out the phishing attack crafting feature. It is super easy to do. You can refer to this link for more information http://www.computerweekly.com/tutorial/Social-Engineer-Toolkit-SET-tutorial-for-penetration-testers
For this last part of our exploration of phishing, we are going to use some content that Dr. Robin Gandhi and I made. Visit: https://mlhale.github.io/nebraska-gencyber-modules/phishing/README/ and go through the url analysis and email analysis modules.
This is a good example of training and education materials that can help combat phishing attacks and spread awareness within an organization. Gotcha hooks
are very effective for getting interested employees to care and consider the implications of their online actions.
For this task, take a screenshot of: