Bài hướng dẫn hack Facebook thông qua cơ chế giả mạo website đăng nhập với bộ công cụ SET trên Back Track.
- What is the Social-Engineering Toolkit (SET)
- The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing.
- It's main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
- Social-Engineering toolkit available on backtrack like on Kali Linux (backtrack 6), backtrack 5, backbox, blackbuntu, Gnacktrack and other Linux distribution that are used for penetration testing.
- Bài hướng dẫn chỉ dùng cho mục đích học tập, nghiên cứu hay Penetration Test. Không áp dụng để thực hiện các hành vi vi phạm pháp luật về an toàn thông tin hay tiến hành trên các hệ thống mạng và mục tiêu mà các bạn không có thẩm quyền.
Section 1. Configure BackTrack Virtual Machine Settings |
- Open Your VMware Player
- Instructions:
- On Your Host Computer, Go To
- Start --> All Program --> VMWare --> VMWare Player
- Instructions:
- Edit BackTrack Virtual Machine Settings
- Instructions:
- Highlight BackTrack5R1
- Click Edit virtual machine settings
- Instructions:
- Edit Network Adapter
- Instructions:
- Highlight Network Adapter
- Select Bridged
- Do not Click on the OK Button.
Section 2. Login to BackTrack |
- Start BackTrack VM Instance
- Instructions:
- Start Up VMWare Player
- Select BackTrack5R1
- Play virtual machine
- Instructions:
- Login to BackTrack
- Instructions:
- Login: root
- Password: toor or <whatever you changed it to>.
- Instructions:
- Bring up the GNOME
- Instructions:
- Type startx
- Instructions:
Section 3. Open Console Terminal and Retrieve IP Address |
- Open a console terminal
- Instructions:
- Click on the console terminal
- Instructions:
- Get IP Address
- Instructions:
- ifconfig -a
- Notes(FYI):
- As indicated below, my IP address is 192.168.1.105.
- Please record your IP address.
- Instructions:
Section 4. Start the Social Engineering ToolKit |
- Start Social Engineering ToolKit
- Instructions:
- cd /pentest/exploits/set
- ./set
- Instructions:
- Website Attack Vector
- Instructions:
- Select 2
- Instructions:
- Select Credential Harvester Method
- Instructions:
- Select 3
- Instructions:
- Select Site Cloner
- Instructions:
- Select 2
- Instructions:
- Enter URL to Clone
- Instructions:
- http://www.facebook.com
- Instructions:
- Website Cloning
- Instructions:
- Press the <Enter> key
- *** Read the Below Notes ***
- Then Continue to the next Section.
- Note(FYI):
- Now you have created a cloned facebook login webpage that is listening on port 80.
- For non-educated Internet users, may be you could send them an email saying check out the new facebook website.
- In my case, the website address would be http://192.168.1.105
- In your case, replace 192.168.1.105 with the IP address you obtained in Section 3, Step 2.
- Once the victim clicks on your cloned website their login and password credentials will be displayed below.
- Instructions:
Section 5. Start Up Windows Machine |
- Social Engineering Note
- The Victim does not have to use the below VMware Instance.
- It can be any type of web browser (i.e., Internet Explorer, Firefox, Chrome, etc) for any type of Operating System (Windows, Linux, MacOS, etc).
- Image an attacker sending an email to the victim that reads, "Hey Check out the new beta version of facebook", or whatever website that was cloned.
- Start Up Damn Vulnerable WXP-SP2.
- Instructions: (copy máy ảo này từ source do giáo viên cung cấp)
- Click on Damn Vulnerable WXP-SP2
- Click on Edit virtual machine Settings
- Note(FYI):
- For those of you not part of my class, this is a Windows XP machine running SP2.
- Instructions: (copy máy ảo này từ source do giáo viên cung cấp)
- Edit Virtual Machine Settings
- Instructions:
- Click on Network Adapter
- Click on the Bridged Radio button
- Click on the OK Button
- Instructions:
- Play Virtual Machine
- Instructions:
- Click on Damn Vulnerable WXP-SP2
- Click on Play virtual machine
- Instructions:
- Logging into Damn Vulnerable WXP-SP2.
- Instructions:
- Username: administrator
- Password: Use the Class Password or whatever you set it.
- Instructions:
- Open a Command Prompt
- Instructions:
- Start --> All Programs --> Accessories --> Command Prompt
- Instructions:
- Obtain Damn Vulnerable WXP-SP2's IP Address
- Instructions:
- ipconfig
- Note(FYI):
- In my case, Damn Vulnerable WXP-SP2's IP Address 192.168.1.116.
- This is the IP Address of the Victim Machine that will be attacked by Metasploit.
- Record your Damn Vulnerable WXP-SP2's IP Address.
- Instructions:
Section 6. Start Up a Web Browser |
- Start Up Internet Explorer
- Instructions:
- Start --> All Programs --> Internet Explorer
- Instructions:
- Victim Clicks on Link
- Note(FYI):
- Replace 192.168.1.105 with BackTrack's IP Address obtain from (Section 3, Step 2).
- Instructions:
- Place the BackTrack IP in the Address Bar.
- In my case, http://192.168.1.105
- Provide a test UserID.
- Provide a test Password.
- Click Login.
- Place the BackTrack IP in the Address Bar.
- Note(FYI):
- Analyzing Results After Login
- Instructions:
- Notice that the Address URL changed to Facebook.
- This is to give the victim a sense of perhaps a failed login attempt instead of invoking suspicion and alarm.
- Notice the Email textbox is populated with the Login you previous supplied to Cloned Webpage.
- Continue to the next section to see the victim's username and password.
- Notice that the Address URL changed to Facebook.
- Instructions:
Section 7. View Victim's Username and Password |
- Viewing Victim's Username and Password
- Instructions:
- Make sure you switch over to BackTrack
- Notice that now you have data showing the victim's username and password.
- Let's say you sent this cloned link to many victim's and left SET run for a while, you will see a lot of username and password combinations.
- To Exit, press the <Ctrl> and "c" key at the same time.
- Instructions:
- Copy Report Link
- Instructions:
- Highlight the XML link
- Right Click
- Click on Copy
- Press Enter
- Instructions:
- Exit Web Attack Menu
- Instructions:
- Type 99
- Press <Enter>
- Instructions:
- Exit Web Attack Menu
- Instructions:
- Type 99
- Press <Enter>
- Instructions:
- Exit Web Attack Menu
- Instructions:
- cat "reports/2012-03-18 13:02:08.167118.xml"
- Note: In your case, this is the report created in Step 2 or this Section.
- Notice the Victim's Login Credentials
- cat "reports/2012-03-18 13:02:08.167118.xml"
- Instructions:
Section 7. Proof of Lab |
- Proof of Lab
- Instructions:
- Clone http://www.linkedin.com
- (See Section 5)
- For the Victim Login use the following address
- first.last@victim.com
- E.g., john.gray@victim.com
- cat the log you created for the cloned linkedin website.
- (See Section 6, Step 5)
- date
- echo "Your Name"
- e.g., echo "DNSSP"
- Clone http://www.linkedin.com
- Proof of Lab Instructions:
- Do a Print Screen using the <PrtScn> button.
- Paste into a word document.
- Email to AnToanThongTin.Edu.Vn@Gmail.Com
- Instructions:
0 nhận xét:
Đăng nhận xét