What Are Social Engineering Attacks?: Phishing IVR or Phone Phishing Baiting Spear Phishing
What Are Social Engineering Attacks?: Phishing IVR or Phone Phishing Baiting Spear Phishing
What Are Social Engineering Attacks?: Phishing IVR or Phone Phishing Baiting Spear Phishing
Social Engineering attacks are the various cons used by the hackers to trick people into providing
sensitive data to the attackers. There are various type of social engineering attacks, some of the
popular attacks are
Phishing
IVR or phone phishing
Baiting
Spear phishing
Step 1:
For this tutorial, we will use our Virtual Hacking Lab we created in the last tutorial.We will use
Kali Linux as our main operating system and Window 7 as our target machine. SET comes pre-
installed in Kali Linux. To run SET, open the terminal in Kali Linux and type the command
below.
Step 2:
Once SET is loaded it will show few options as shown in the image below. Select “Social-
Engineering Attacks” by entering “1” and hit enter.
Now it will show you another set of options, select “Website Attack Vectors” by entering “2” and hit
enter.
Step 3:
Then it will show you three options as shown below, the first option will be “Web Templates” it
gives five pre-defined websites that you use for phishing. The second option is “Site Cloner”
using this option you can clone login page of any website and the third option which we will be
using for this tutorial is “Custom Import” using this you can use your own login page template.
Select option “3) Custom Import” and press enter.
Step 4:
In this step, it will ask for your IP address, if you are running the attack on LAN you can provide
your internal IP address and if you are executing the attack on WAN then you have to provide
your external IP address. In this tutorial, we will be executing the attack on LAN, to check you
internal IP address run “ifconfig“. Enter your IP address and hit enter.
Step 5:
Go to www.facebook.com, save the login page by clicking right click and selecting the “Save as”
option. A new window will pop up rename the file name to “index” and select “Webpage,
HTML Only” in the drop-down menu below.
Step 6:
Enter the path where you stored index.html file make sure to add “/” at the end of the path. Now
it will show you two options, select “copy the entire folder” and hit enter. Now enter the website
you are trying to hack. Follow these steps as shown in the image below.
Well done! you have successfully configured the Social Engineering Toolkit’s Credential Harvester
Attack. Now your screen should look similar to the image shown below.
Step 7:
In this step, I will show you how the attack work by opening the phishing link on the target
machine and filling by fake login credentials in our phishing facebook website. I will go to our
target machine, open internet explorer and enter your IP address(10.0.0.10) and fill the login
details.
Now I will go back to Kali Linux and check if we have successfully harvested the login details.
We have successfully stolen the Facebook login credentials from the target machine.