214
◾
Ethical Hacking and Penetration Testing Guide
All of this can be easily done by using various modules in Social engineering toolkit. For the last
scenario, we will learn to attack over the Internet (WAN) instead of LAN. But for now, let’s talk
about another scenario where we will use the SET to set up a fake log-in page.
Credential Harvester Attack
Credential harvester is a very popular attack; it can be used to perform a phishing attack. In a
phishing attack, an attacker sets up a replica of a website, say, gmail.com, whenever the victim logs
in to it, the credentials will be saved. This can be done with the “Credential Harvester Attack” in
SET. Let’s see how to do it.
Step 1
—From
the website attack vectors, select “Credential Harvester Attack.” Now you will
have three options: you can use predefined templates in SET, clone a site of your choice, or
import your own template, in case option 2 does not work for you. For the sake of simplicity,
I will choose the first option.
Step 2
—It will now ask you the “IP address” to which you
want the credentials posted, which
in this case would be my local IP, since in this case I am attacking my LAN.
Step
3
—It will not show you the list of built-in templates. In this case, I want to use gmail.com.
As you
can see from the screenshot, the credential harvester is up and running on the IP we
entered. We can perform a DNS spoofing attack by replacing gmail.com’s IP with our’s where
the credential harvester is running. We already learned about DNS spoofing in the “Network
Sniffing” chapter (Chapter 6).
Client Side Exploitation
◾
215
As soon as the victim
navigates our IP address, where we have set up our credential harvester,
his credentials would be recorded and displayed to us.
Dostları ilə paylaş: