zoukankan      html  css  js  c++  java
  • Penetration Test

    Remote Social Engineering

    SOCIAL ENGNEERING
    • Tricking or coercing people into violating security policy
    • Depends on willingness to be helpful
    • Human weaknesses can be leveraged
    • May rely on technical aspects
    • Bypasses access controls and most detection controls
    PHISHING
    • Phishing - people are contacted by a seemingly legitimate imposter in an attempt to extract sensitive information
      • Spear phishing
      • SMS phishing
      • Voice phishing
      • Whaling
    Spear phishing Demo

    Pre-setup

    apt-get install sendmail
    

    image-20200913105205304

    sendmailconfig
    

    image-20200913105726286

    SET(Social Engineering Toolkit)

    image-20200913110123803

    Agree to the legal terms of service.

    image-20200913110613869

    Choose No.1 Social-Engineering Attacks

    image-20200913111026885

    Choose No.1 Spear-Phishing Attack Vectors

    image-20200913111235124

    Perform a Mass Email Attack

    image-20200913111459904

    Let try No.6 Microsoft Word RTF pFragements Stack Buffer Overflow(MS10-087)

    image-20200913111902338

    Perform No.2 Windows Meterpreter Reverse_TCP

    image-20200913112155810

    Setup the listener host and port.

    image-20200913112807673

    Rename the Filename an interesting one.

    image-20200913113140524

    Send user-defined email to a single Email address.

    image-20200913113508779

    image-20200913114815488

    Send this email from my own server.

    image-20200913115324216

    Set up the listener.

    image-20200913115536883

    When the victim opens the attachment, MSF will alter you a connection has been established.

    QUICK REVIEW
    • Social engineering is all about getting an authorized user to do your dirty work
    • Relies on most peoples' willingness to be helpful
    • Successful social engineering can bypass nearly all technical controls
    • Phishing is attempting to get a valid user to click on a link to your exploit
    • Spear phishing is all about targeting a specific individual
    • Crafting a realistic email is crucial
    • The goal is to get a user to click on the link you sent without too much prior thought.
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    偏态分布的均值与中位数关系
    Leetcode 769. Max Chunks To Make Sorted
    【STL】max_element()函数
    [LeetCode] 1338. Reduce Array Size to The Half
    [LeetCode] 985. Sum of Even Numbers After Queries
    [LeetCode] 984. String Without AAA or BBB
    [LeetCode] 1405. Longest Happy String
    [LeetCode] 1646. Get Maximum in Generated Array
    [LeetCode] 926. Flip String to Monotone Increasing
    [LeetCode] 1658. Minimum Operations to Reduce X to Zero
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13660515.html
Copyright © 2011-2022 走看看