W23 SPR100 Lab 6 v3 (1)

docx

School

Seneca College *

*We aren’t endorsed by this school

Course

100

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by ElderLeopardMaster1065

Report
SPR100 Labs Lab 6: A Happy Day Phishing (2%) Overview: In this lab assignment you’ll be learning about phishing attacks and email header spoofing. Specifically, you’ll be doing the following: Downloading and installing a mail client Connecting the mail client to the mail server Exchanging normal emails and with display information changed Logging in to the mail server and sending bogus emails Testing yourself to see if you can identify a phishing attack Note: All screen-shots must have your command-line title with name, date and time visible Objective: 1. Demonstrate how SMTP commands can be used to forge email headers 2. Learn how to identify a Phishing attack Background: SMTP and Email Headers Email spoofing is a technique, used by many web-based attacks, which creates a forged email header so that the message appears to have originated from someone or somewhere other than the actual source. Most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, phishing scams and spammers often spoof addresses in order to get recipients to open, and possibly even respond to, their solicitations. A phishing scam will often send a spoofed e-mail which purports to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information. A spammer may send a spoofed email which appears to be from personal friend sending an attachment which when clicked redirects the user to a malicious web site which downloads and installs spyware, a key logger or a rootkit – a technique called “drive-by downloads”. The goal of spammers can be criminal such as the theft of personal information, which they sell, or commercial, profiling the user in order to send him\her targeted advertisements. This lab explains how and why such attacks are successful. E-mail forging is possible because the Simple Mail Transfer Protocol (SMTP), used by email servers to exchange emails does not perform any verification or authentication mechanism. The fact that anyone can send anonymous or forged emails is exploited by unscrupulous people for personal gain. Your e- Page 1 of 5
SPR100 Labs mail client uses SMTP to send a message to the mail server, and the mail server uses SMTP to relay that message to the correct receiving mail server. To prevent abuse of an SMTP server, the server must be configured as follows: 1. To accept a message, either the sender’s or the recipient’s address must belong to the same domain as the server 2. To send a message, the sender must belong to the same domain as the mail server and the server will only forward the message to a server of that domain. NB: Spoofing anyone other than yourself is illegal. The Lab Activities Part 1: Mail Client Setup (Security Lab) 1. Check that your VMM and Win10 VM have the correct configurations for access the Security Lab network 2. Start up the Window’s 10 VM and login 3. If the Thunderbird mail client is not already installed on your Win 10 VM do the following: Download the mail client Thunderbird from the Security Lab server – Under SPR100 Install Thunderbird on to the VM 4. Configure Thunderbird based on the e-mail address you have been assigned by the instructor and using the details given in Figure 1 below Note: you will substitute your own name for “Your name” and your mail address is ‘mail<number>@securitylab.net’. The <number> can be found by doing ‘ipconfig /all’ command and looking at the Host Name. Use the middle number in the host name for <number>. 5. The password will be given in class . Figure 1: Thunderbird account configuration 6. Take a screen-shot of the set-up account screen above and save it as MSU_mail_config.jpg and insert it into your lab report under the heading: “ Mail Configuration 7. Click ‘Continue’, it should then find the configuration for ingoing and outgoing mail. You should then get a ‘Warning’ dialog. Check ‘I understand the risks’ and click ‘Done’ 8. For ‘System Integration’, select ‘Skip Integration’ Page 2 of 5
SPR100 Labs Part 2: Sending and Receiving Mail (Security Lab – Optional) To demonstrate that the Thunderbird mail client and mail server are acting as you would expect send a polite email to another member of the class using their Security Lab mail server email address and have them send you an email to your Security Lab mail server email address i.e. the email address above. Part 3: Sending and Receiving Mail – changing you “Display Information” (Security Lab) The simplest level of spoofing attack is changing the display name on an email before it is sent. Figure 2 and Figure 3 shows my default “display” details and my fake “display” name. Figure 2 : Default display name Figure 3: Modified display name Steps: Modify your display details to something interesting and take a screenshot showing the account setting (as above); name it “MSU_displaysettings.jpg” and insert it in your lab report under the heading “ Display Spoofing ”. Send yourself an email and take a screen-shot of your inbox – make sure the “ From ” column is present so the fake display details are visible – and save it as “MSU_fakeFrom.jpg”. Insert the screenshot under the previous image. Part 4: Sending Yourself and the Instructor a Forged Email (Security Lab) A more sophisticated and harder to detect method of forging an email is to send a forged email from the SMTP server itself. To illustrate how easy it is to send a forged email, you will send forged emails to: 1. Your Security Lab mail server account 2. Your instructor’s mail server account: “instructor1@securitylab.net” Page 3 of 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
SPR100 Labs To do this you’ll be using the SMTP server. The six SMTP commands to use are HELO, MAIL FROM, RCPT TO, DATA, SUBJECT and QUIT. What to type after each command is displayed in bold. HELO: – identifies the host to the SMTP server – mail.ifslab.net MAIL FROM: – this is your fake address– source email address RCPT TO: – destination email address – mail<n> @securitylab.net DATA: – identifies the beginning of the email message content Subject: – identifies the subject line of the email message -- enter your email subject here . – a period on a line by itself ends the data stream QUIT – terminates the session Note: Press the Enter key wherever the (ENTER KEY) is shown. Back-spacing does not actually work even though it seems to allow you to backspace . You will need to re-enter to whole message again. Steps: 1. Open a command window on the Security Lab workstation desktop 2. Type the following command on the command-line telnet smtp.securitylab.net 25 (ENTER KEY) Note: If the above does not work, do the following on your Windows 10 VM Open Putty Change the connection type to Telnet and specify port number to be 25 Enter the host address as: smtp.securitylab.net Click on ‘ Open’. A command prompt window should open and you should enter the command below. 3. Using the command-line type the following, substituting information where required to send a forged email to yourself e.g. for the MAIL FROM entry. HELO (ENTER KEY) HELO mail.securitylab.net (ENTER KEY) MAIL FROM : you@domain.com (ENTER KEY) RCPT TO : mail<n>@securitylab.net (ENTER KEY) DATA (ENTER KEY) SUBJECT : SPR100 <Your Name> (ENTER KEY) Type your message here! (Type the . to end the message being sent) . QUIT Page 4 of 5
SPR100 Labs Figure 4 gives you an example of what the commands look like. Figure 4 : Complete SMTP session Take a screenshot of: o SMTP session, saving it as “MSU_smtp.jpg” and insert it into your lab report under the heading “ SMTP Session ”. o The received forged message and save it as “MSU_forgedmail.jpg” and insert it into your lab report under the heading “ Forged Email 4. Repeat the above sending a forged email to the instructor. Ensure you include your name in the subject line of the email . Not doing so means the instructor will not know who sent the message! Part 5: Phishing (Internet) Phishing is a specialized form of social engineering and "injection" technique which “spoof” an entire web site and trick a user into giving confidential information to the attacker. The best line of defense is to recognize emails and web messages that could be phishing attacks: 1. Navigate to https://www.opendns.com/phishing-quiz/ This web site presents you with a quiz of real phishing scams and educates users on how to spot them. The quiz consists of 14 fake and genuine email messages. 2. Do the quiz and take a screen shot of the page that has your final scores and save the file a “MSU_test.jpg”. Insert the screenshot into your lab report under the heading “ Phishing Quiz ”. Report Submission Now that you have filled out the lab report, you need to submit it along with you elog book. This is done through the submission link given with the lab on Blackboard. Page 5 of 5