216
◾
Ethical Hacking and Penetration Testing Guide
Step 3
—Now, let’s see the attack on the victim’s website. As soon as the victim loads the site,
he will see the following screen:
As soon as he switches the tab, the website will be redirected to the fake gmail log-in page.
As soon as our victim enters the credentials, his credentials will be saved.
Other Attack Vectors
We have other advanced attack vectors in the SET related to phishing. One of them is “Man Left
in
the Middle,” where the attacker requires an XSS vulnerability to trigger an attack. Since we
haven’t learned about XSS vulnerability yet, we won’t discuss it now. We
will learn all about it in
the “Web Hacking” chapter (Chapter 12). Another great attack vector is the “Web Jacking” attack
vector, where the victim would be presented a link stating “Website has been moved.” When the
victim
hovers his mouse over the link, it would point to the real URL, not the attacker’s URL.
Here is what the victim would be presented with:
Whenever the victim clicks on it, gmail.com
will open; however, it will be replaced with our
malicious webserver after a few seconds.
Tip
:
A better attack strategy is to register a domain similar to the real domain; for example, in the
case of facebook.com, you can register faceboook.com and host your attack there
.