Tabnabbing Attack Method Penetration Testing Lab
Tabnabbing Attack Method Penetration Testing Lab
Tabnabbing Attack Method Penetration Testing Lab
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
1 de 6
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
(h p://pentestlab.les.wordpress.com/2012/03/14.png) Website A ack Vector Next we will see the available a acks that we can use.Of course our choice here is option number 4 and the Tabnabbing A ack Method.
(h p://pentestlab.les.wordpress.com /2012/03/23.png) Selecting the Tabnabbing A ack In the next menu we will choose option number 2 in order to clone the Website of our preference.Remember that the Tabnabbing a ack only works with websites that they have elds for username and password so choose these kind of websites for cloning.
2 de 6
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
(h p://pentestlab.les.wordpress.com/2012/03/33.png) Selecting the Site Cloner Now it is time to choose the website that the SET will clone.In this scenario our choice will be the Gmail.
(h p://pentestlab.les.wordpress.com/2012/03/42.png) Enter the Fake Website for Cloning If we send a link with our IP address to our victim and he opens it he will notice that a new tab will open and a message will appear saying the following:
(h p://pentestlab.les.wordpress.com/2012/03/53.png) Opening the webpage This message will stay there until the user switch tabs in his browser.Then the fake website will load and we just have to wait to enter his credentials in order to capture them.
3 de 6
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
(h p://pentestlab.les.wordpress.com/2012/03/63.png) Fake Gmail Page The next image is showing what we will see in SET when the victim inserts his credentials into the username and password elds.
(h p://pentestlab.les.wordpress.com/2012/03/82.png) Capturing the Credentials Conclusion As most social engineering a acks and this type of a ack requires to cover our IP address with a domain that it will look legitimate.This technique is similar to the Credential Harvester method with the only dierence that the user needs to switch tabs thinking that the page will take too long to load.
4 de 6
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
This a ack is very easy to implement it by anybody and many unexperienced users will probably become victims so these type of users they need to have extra awareness.
About netbiosX
Penetration Tester,Metasploit Framework addicted and a Social Engineer guy. View all posts by netbiosX 6 Comments Posted by netbiosX on March 20, 2012 in Social Engineering
http://pentestlab.wordpress.com/2012/03/20/tabnabbing-attack-method/
August 4, 2012 at 12:27 pm Here is the problem , this is work on the same network , i mean , it local network , how can we use the victim on other network , Reply 5. netbiosX August 4, 2012 at 8:22 pm Fane the Social Engineering Toolkit can be used on dierent networks as well.The only thing that you have to do is to set the AUTO_DETECT option to O from the conguration le of SET. Reply anashlali August 10, 2012 at 11:47 pm Hi netbios the AUTO-DETECT is o but it seems the link dont work from another network, I used goo.gl to generate the link. Help Pls. Best, Anashlali Reply
Blog at WordPress.com. Theme: Choco by .css{mayo}. Entries (RSS) and Comments (RSS)
6 de 6