zoukankan      html  css  js  c++  java
  • Penetration Test

    Remote Social Engineering

    SOCIAL ENGNEERING
    • Tricking or coercing people into violating security policy
    • Depends on willingness to be helpful
    • Human weaknesses can be leveraged
    • May rely on technical aspects
    • Bypasses access controls and most detection controls
    PHISHING
    • Phishing - people are contacted by a seemingly legitimate imposter in an attempt to extract sensitive information
      • Spear phishing
      • SMS phishing
      • Voice phishing
      • Whaling
    Spear phishing Demo

    Pre-setup

    apt-get install sendmail
    

    image-20200913105205304

    sendmailconfig
    

    image-20200913105726286

    SET(Social Engineering Toolkit)

    image-20200913110123803

    Agree to the legal terms of service.

    image-20200913110613869

    Choose No.1 Social-Engineering Attacks

    image-20200913111026885

    Choose No.1 Spear-Phishing Attack Vectors

    image-20200913111235124

    Perform a Mass Email Attack

    image-20200913111459904

    Let try No.6 Microsoft Word RTF pFragements Stack Buffer Overflow(MS10-087)

    image-20200913111902338

    Perform No.2 Windows Meterpreter Reverse_TCP

    image-20200913112155810

    Setup the listener host and port.

    image-20200913112807673

    Rename the Filename an interesting one.

    image-20200913113140524

    Send user-defined email to a single Email address.

    image-20200913113508779

    image-20200913114815488

    Send this email from my own server.

    image-20200913115324216

    Set up the listener.

    image-20200913115536883

    When the victim opens the attachment, MSF will alter you a connection has been established.

    QUICK REVIEW
    • Social engineering is all about getting an authorized user to do your dirty work
    • Relies on most peoples' willingness to be helpful
    • Successful social engineering can bypass nearly all technical controls
    • Phishing is attempting to get a valid user to click on a link to your exploit
    • Spear phishing is all about targeting a specific individual
    • Crafting a realistic email is crucial
    • The goal is to get a user to click on the link you sent without too much prior thought.
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    强制设置IE浏览器的版本模式
    设置DIV根据内容自动调整高度的三个方法
    VS2010如何调试IIS上的网站
    DataSet和List<T> 泛型之间互相转换 (转载, 作者写的很好)
    List转DataSet
    数据库中单个表数据备份
    第二阶段冲刺(第二天)
    冲刺第二阶段(第一天)
    学习进度条(第十四周)
    学习进度条(第十三周)
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13660515.html
Copyright © 2011-2022 走看看