F23SEC220L4-PhishingInstructions_233
docx
keyboard_arrow_up
School
Seneca College *
*We aren’t endorsed by this school
Course
220
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
9
Uploaded by MinisterAlpacaMaster987
SEC220
Lab 4: A Happy Day Phishing (4%)
Lab 4: A Happy Day Phishing (4%)
Overview:
This lab will teach you about phishing attacks and email header spoofing. Specifically, you'll
be doing the following:
Downloading and installing a mail client
Connecting the mail client to the mail server
Exchanging normal emails and with display information changed
Logging in to the mail server and sending bogus emails
Clone a website and send a phishing email
Objective:
1.
Demonstrate how SMTP commands can be used to forge email headers
2.
Use the SEToolkit to clone a website, create and send a phishing email
3.
To work as a team
Background: SMTP and Email Headers
Email spoofing is a technique used by many web-based attacks, which creates a forged
email header so that the message appears to have originated from someone or somewhere
other than the actual source. Most spoofed email falls into the "nuisance" category and
requires little action other than deletion. The more malicious varieties can cause serious
problems and security risks. For example, phishing scams and spammers often spoof
addresses in order to get recipients to open and possibly even respond to their
solicitations.
A phishing scam will often send a spoofed email that purports to be from someone in a
position of authority, asking for sensitive data, such as passwords, credit card numbers, or
other personal information. A spammer may send a spoofed email that appears to be from
a personal friend sending an attachment which, when clicked, redirects the user to a
malicious website that downloads and installs spyware, a key logger, or a rootkit – a
technique called "drive-by downloads." The goal of spammers can be criminal such as the
theft of personal information, which they sell, or commercial profiling of the user to send
him\her targeted advertisements. This lab explains how and why such attacks are
successful.
Fall 2023
Page 1 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
Email forging is possible because the Simple Mail Transfer Protocol (SMTP), used by email
servers to exchange emails, does not perform any
verification
or
authentication
mechanism. The fact that anyone can send anonymous or forged emails is exploited by
unscrupulous people for personal gain. Your email client uses SMTP to send a message to
the mail server, and the mail server uses SMTP to relay that message to the correct
receiving mail server.
To prevent abuse of an SMTP server, the server must be configured as follows:
1.
To accept a message, either the sender's or the recipient's address must belong to
the same domain as the server
2.
To send a message, the sender must belong to the same domain as the mail server
and the server will only forward the message to a server of that domain.
Note:
1.
Spoofing anyone other than yourself is illegal
2.
All parts of this lab must be done on campus in the IFS Security lab
3.
This is a group lab – you will be randomly assigned a team member
The Lab Activities
Part 1: Mail Client Setup
In your lab report, enter the main heading
Part 1: Mail Client Setup
1.
Make sure your Windows 10 network configuration has been set with Bridge
. You
must receive the IP address as 172.16.XXX.XXX (IFSLAB.NET). You can check
ITAS+Tech+Support+Notebook
and scroll to Email Lab
2.
Open Thunderbird (already installed on your Windows 10 VM)
3.
Configure Thunderbird based on your PC number (see the label attached to the front of
your PC) and using the details given in Figure 1 below
4.
Note: please type your own full name for "Your name," and your mail address is your PC
number prefixed with the word “mail” e.g. if your PC number is "XXXXXX-06-XXXX",
then use Mail6, if your PC number is "XXXXXX-23-XXXX", then use Mail23.
5.
The password will be given in class or check on Teams
.
Figure 1: Thunderbird account configuration
Fall 2023
Page 2 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
6.
Take a screenshot of the set-up account screen (as shown above) and save it as
MSU_mail_config.jpg and insert the labeled screenshot into your lab report under the
subheading : "
Mail Configuration
"
Part 2: Sending and Receiving Mail
In your lab report, enter the main heading
Part 2: Sending and Receiving Mail
To demonstrate that the
Thunderbird
mail client and server are acting as you would expect,
send a test polite email to another class member using their "IFS Lab mail server" email
address and have them send you an email to your "IFS Lab mail server" email address.
Part 3: Sending and Receiving Mail – Changing Your "Display Information"
In your lab report, enter the main heading
Part 3: Sending and Receiving Mail –
Changing Your Display Information
The simplest level of spoofing attack is changing the display name on an email before it is
sent. Figure 2 and Figure 3 show my default "display" details and my fake "display" name.
Figure 2
: Default display name
Figure 3:
Modified display name
Steps:
7.
Modify your display details and take a screenshot showing the account setting (as
shown above); name it "MSU_displaysettings.jpg" and insert the labeled screenshot in
your lab report under the subheading "
Display Spoofing A
".
a.
Include a description of what is shown in the screenshot
8.
Send yourself an email and take a screenshot of your inbox – ensure that the "
From
"
column is present in your inbox window, so the fake display details are visible
(check
the image on Teams to see how to do this)
– and save it as “MSU_fakeFrom.jpg”. Insert
the the labeled screenshot in your lab report under the heading “
Display Spoofing B
”
(
You might need to click
Get Message
as the Message will not be displayed automatically
).
a.
Include a description of what is shown in the screenshot
Fall 2023
Page 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
SEC220
Lab 4: A Happy Day Phishing (4%)
Part 4: Sending Yourself a Forged Email
In your lab report, enter the main heading
Part 4: Sending Yourself a Forged Email
A more sophisticated and harder-to-detect method of forging an email is to send a forged
email from the SMTP server itself. To illustrate how easy it is to send a forged email, you
will send forged emails to Your IFS Lab mail server account
To do this, you’ll be using the SMTP server. The six SMTP commands to use are HELO, MAIL
FROM, RCPT TO, DATA, SUBJECT, and QUIT. What to type after each command is
displayed in bold.
HELO:
– identifies the host to the SMTP server – mail.ifslab.net
MAIL FROM:
– source email address –
this is your fake address
RCPT TO:
– destination email address – mail<n>
@ifslab.net
DATA:
– identifies the beginning of the email message content
Subject:
– identifies the subject line of the email message
.
– a period on a line by itself ends the data stream
QUIT
– terminates the session
Note:
Backspacing does not actually work, even though it seems to allow you to
backspace.
Steps:
1.
Open a
command
window (CMD) on the IFS Lab workstation desktop
2.
Type the following command on the command-line
telnet smtp.ifslab.net 25
3.
Using Notepad (or any text editor), copy the following commands to Notepad and
modify each line with the correct information as the following:
HELO
HELO
mail.ifslab.net
MAIL FROM
: you@domain.com
RCPT TO
: mail<n>@ifslab.net
DATA
SUBJECT
: your message subject here
Type your message here!
(Type the
.
to end the message being sent)
.
QUIT
Figure 4 below gives you an example of what the commands look like.
Fall 2023
Page 4 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
Figure 4
: Complete SMTP session
4.
Take screenshots of the following:
a.
SMTP session, save it as “MSU_smtp.jpg” and insert the labeled screenshot into your
lab report under the subheading “
SMTP Session
”.
a.
Include a description of what is shown in the screenshot
b.
“The received forged message” and save it as “MSU_forgedmail.jpg” and insert the
labeled screenshot into your lab report under the subheading “
Forged Email
”
a.
Include a description of what is shown in the screenshot
Part 5: Clone a Website and Send a Phishing Email
In your lab report, enter the main heading
Part 5: Clone a Website and Send Phishing a
Email
You will use the Social Engineering Toolkit (SEToolkit) in your Kali Linux to do this part.
This software has many tools to attack as a Social Engineer: (
more information
)
1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) Third Party Modules
In this lab, you are just working with Website Attack Vectors. You will clone a website and
send the fake link by email to your partner. Once your partner types the credential and
submits it, you will see the username and password in your SEToolkit.
This part of the lab is a group lab, and you must be at least 2 members in this lab. Each
member must do all the parts and attack the other members (only one attack is enough for
each student)
Part 5-1:
Fall 2023
Page 5 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
Make sure your Kali Linux network configuration has been set with Bridge
. You must
receive the IP address as 172.16.XXX.XXX. You can check
MS Teams WIKI
.
1.
Open your Kali Linux and login as root
You can login with the kali account and use "sudo su" to open a shell as the
root account.
2.
Run setoolkit to start to make a clone website.
3.
From the list, select number 1, "Social-Engineering Attacks". From the second list,
choose number 2, "Website Attack Vectors". In the third list, select number 3,
"Credential Harvester Attack Method". Now it is time to clone the specific website.
In the fourth list, choose number 2, "Site Clone".
4.
The software asks you to type your kali Linux IP address.
5.
Then it will ask you to enter the website's URL to clone, which you must type one of
the following URLs Iif the SEToolkit refuse to clone the npage, use another URL):
http://172.16.11.230
http://172.16.11.229
http://172.16.11.228
http://172.16.11.227
http://172.16.11.230/sec220.html
It will wait for any harvesting.
Part 5-2:
6.
Open your email and write a phishing email to your partner as the following:
Write a phishing email
Fall 2023
Page 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
SEC220
Lab 4: A Happy Day Phishing (4%)
o
You must convince your partner psychologically to click on the link, i.e.,
your email should sound convincing and authentic and should motivate
your partner to act on the contents of the email, e.g., click on a link
o
You can choose what scenario you like (IT Technician, Helpdesk,
Instructor, etc.…)
Create a URL link with your Kali Linux IP address. (EXAMPLE:
http://172.16.1.140
)
o
The URL is not supposed to be visible
7.
Take a screenshot of
your email and insert the labeled screenshot into your lab
report under the subheading “
Phishing Email
”
Include a description of what is shown in the screenshot
8.
Send the email to your partner.
Your partner must click on the link
. The fake
website will open on your partner's screen. He/She must type the following
information and submit it:
Username: Type Your Full Name (i.e. John Smith)
Password: Your Seneca Account (not password) (i.e. jsmith123)
You should receive all the above credentials in your SEToolkit as the following:
Fall 2023
Page 7 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
Part 5-3:
9.
Press Control-C (CTRL+C) to create a report and exit from SEToolkit. Go to
directory /root/.set/reports/ and open the XML file with the nano text editor.
10.
Take a screenshot from your SEToolkit to show credentials and insert the labeled
screenshot into your lab report under the subheading “
Victim’s Credentials
”.
Include a description of what is shown in the screenshot
Deliverable: Report Submission
1.
Complete your Lab report write-up and submit
your properly formatted and
professional looking report of your tasks via the
F23 Lab 4 Phishing (4%)
link
o
You should also follow the
posted
Document Formatting and Submission
Guidelines, e.g.,
have a title page (the name of each member of the group
should also be on the title page), include an introduction, conclusion
,
in-text
citations
,
references page
, etc.
In your Introduction, demonstrate that you have a clear understanding of
what the lab entails
In your conclusion, demonstrate that you have a clearly understanding of
the lab activities that you completed and your takeaways, e.g., what is the
significance of the steps, why are they necessary, what did you learn, etc.
o
Screenshots MUST be in the report with labels, descriptions, and your
customized background
Fall 2023
Page 8 of 9
SEC220
Lab 4: A Happy Day Phishing (4%)
Since this is a group lab, for the questions that require individual
screenshots, please include the labeled screenshot from each group
member
2.
The due date is
Sunday, November 12, 2023 @ 11:59PM EST
3.
Submission filename should have the following format: “<Lab number>-<Course code>-
<your first and last name>, for example, L0-SEC220-jasleenkaur.docx
Labs Policies
1.
The labs will be done as individual work, unless otherwise stated
2.
When a template is provided, you are expected to use the template plus follow the
guidelines for document formatting. If a template is not provided, your report should
follow the document formatting guidelines.
Late Submission Policy
1.
You will have at least one week from opening lab to finish and submit it
a.
Submissions 1-2 days late will see a 50% late penalty
b.
Submissions after two days will receive a grade of zero
Promotion Policy:
To obtain a credit in this subject, a student must:
1.
Achieve a weighted average of 50% or better for practical and written tests
2.
Achieve a grade of 50% or better on the overall course
3.
Must satisfactorily complete and submit all labs and assignments - this means
that even if you have a very good overall passing grade, but did not complete
all your labs, you will not be promoted to the next semester.
Fall 2023
Page 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help