Unlimited Attempts AllowedDetails Virtual Labs: Sniffing & Social Engineering Consider

 Unlimited Attempts AllowedDetails

Virtual Labs: Sniffing & Social Engineering

Consider what you have learned so far about Sniffing and Social Engineering as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below.

Objective

Social engineering is the art of convincing people to reveal confidential information. Social engineers depend on the fact that people know certain valuable information yet are generally careless in protecting it.

The objective of this lab is to:

  • Detect phishing sites
  • Protect the network from phishing attacks
  • Perform Credential Harvesting
  • Perform security assessment on a machine using a payload generated by SET

Scenario

Social engineering is the art of convincing people to reveal sensitive information in order to perform some malicious action. Organizations fall victim to social engineering tricks despite having security policies and best security solutions in place, as social engineering targets people’s weaknesses or good nature. Reconnaissance and social engineering is generally an essential component of any information security attack.

Cybercriminals are increasingly utilizing social engineering techniques to exploit the most vulnerable link in information system security: employees. Social engineering can take many forms, including phishing emails, fake sites, and impersonation.

McAfee’s new “Hacking the Human Operating System” whitepaper focuses on the use of social engineering to attack home and business users and finds once again that people are the weakest link. The McAfee report points out that there are many organizations who develop and deliver user awareness programs into their business areas, but the effectiveness of such programs varies, and in some identified cases, even after the security training has been delivered, it has done very little to educate their end-users with any valued security awareness to mitigate the threat of the social engineering attack.

It is essential for you as an expert Ethical Hacker and Penetration Tester, to assess the preparedness of your organization or the target of evaluation against the social engineering attacks.

Though social engineering primarily requires soft skills, the labs in this module demonstrate some techniques that facilitate or automate certain facets of social engineering attacks.

Week 7 Lab Assignment 1: Protect the Network

Lab Task:

The objective of this lab is to help students learn how to:

  • Clone a website
  • Obtain username and passwords using Credential Harvester method
  • Generate reports for a conducted penetration test

Lab Description:

Social Engineering is an ever-growing threat to organizations all over the world. Social Engineering attacks are used to compromise companies every day. Even though there are many hacking tools available throughout underground hacking communities, Social Engineering Toolkit (SET) is a boon to attackers, as it is freely available and applicable to Spear-phishing attacks, website attacks, and many others. Attackers can draft email messages, attach malicious files, and send them to a large number of people using spear phishing. In addition, the multi-attack method allows the utilization of Java applets, the Metasploit browser, and Credential Harvester/Tabnabbing all at once.

Though numerous sorts of attacks can be performed using SET, it is also a must-have tool for penetration testing to check for vulnerabilities. SET is the standard for social-engineering penetration tests, and is supported heavily in the security community.

As an Ethical Hacker, Penetration Tester, or Security Administrator, you should be familiar with the Social Engineering Toolkit to perform various tests for network vulnerabilities.

The Social Engineering Toolkit is an open-source Python-driven tool aimed at penetration testing. The SET is specifically designed to perform advanced attacks against humans by exploiting human behavior. The attacks built into the toolkit are designed to be targeted and focused on attacks against a person or organization used during a penetration test.

decorative image

Access the lab here: EC-Council | iLabsLinks to an external site.

Submit proof of this assignment completion by uploading and submitting a screenshot of the graded lab from EC-Council Labs. Refer to the Course Projects page for more information on project submissions. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

patient file

Your final project for this course will be a patient record analysis. You will apply the knowledge of anatomy, physiology, and pharmacology that you have developed during this course in a thorough review of existing patient information in the Final Project Patient File. Specifically, you will review a patient’s history

610 6-1 Discussion: Improve, Part Two—Mitigating Unwanted Consequences

 The Essential Workplace Conflict Handbook. Including the IMPROVE Supplementary Document. Next, in your initial post, address the following: • In what ways do you perceive the Improve phase as being informed by the other phases of DMAIC that you have worked with in the course thus far? • How can

Code of conduct

 For this assignment, Write a paper about employee codes of conduct using information from your textbook and at least two other scholarly sources. First, research employee codes of ethics, especially for the medical field. Next, find some examples of employee codes of ethics from medical facilities and choose the one

Human Growth and Development

Scenario: Simon Whitaker is 42 years old and has suffered from mental illness since his late teens. He lives in a flat in a large housing estate. He lost his job as a warehouse cleaner after he was admitted to hospital the last time he became ill, two years ago.

Exporting Security

Write a 2 page argumentative essay on the links provided below. Link 1: https://www.airuniversity.af.edu/SSQ/Book-Reviews/Article/1292320/exporting-security-international-engagement-security-cooperation-and-the-changi/ Link 2:https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review Link 3: https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review #Exporting #Security

Organizational culture and values

 Details: Prepare a 10-minute presentation (10-15 slides, not including title or reference slide) on organizational culture and values. Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes. Discuss how an individual can use effective communication techniques to overcome

Document Analysis

Document Analysis (5% – c. 500 words) Primary sources are writings that were produced by individuals or groups at the time of the historical events or issues that they deal with. A number of such documents have been placed on Blackboard, organized by course unit. This assignment requires you to

M3D1: Big Data

The discussion will examine the social interaction of participants regarding an issue or situation and its impact on research data. This discussion addresses the following module outcomes: •MO1: Become familiar with the process of conducting marketing research methods and research tools •MO2: Review the process marketers use for identifying and

Case Study 1 and 2 Pneumonia and Addison diseases

Review the case study and answer all questions with a scholarly response using APA and include 2 scholarly references. Answer both case studies on the same document and upload 1 document to Moodle. Case Studies will be uploaded to Moodle and put through TURN-It-In (anti-Plagiarism program) Turn it in Score

Should schools ban unhealthy snack machines?

 Your outline should include: An explanation of the controversial issue, why is it controversial? Identify which position or side you will take in your paper, and explain why. If you don’t agree with the position you are taking discuss how this could affect your argument on the topic. If you

The Outcome of Inequality of Wealth and Income

Research Topic: Submit an idea for a research study based on a business/economic problem. • Write the title of the study. • Explain your overarching aim for the study. • What is the problem? • What is the significance of it? • Draft at least two research questions. Due 1/27

“practice of professional engineering”

1. “practice of professional engineering” means any act of planning, designing, composing, evaluating, advising, reporting, directing or supervising that requires the application of engineering principles and concerns the safeguarding of life, health, property, economic interests, the public welfare or the environment, or the managing of any such act; (“exercice de

Curriculum Development and Evaluation

 Learning Materials: Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapter 13) Books are on website Vital Source user name is sred9196@yahoo.com, the password is Bungalow9@ • Exercise #1: Address an educational need among nursing staff at a health care agency. In the

Epidemiology and Surveillance

Research the public health agency in Chicago, IL and develop a presentation on its structure, response capabilities, surveillance tools, and role in emergency management. In your response, include a description of the community served by the department (Chicago), its emergency response structure, surveillance systems that are used at hospitals, biohazard

General Psychology Application

 General Psychology Application Essay Over the course of the class, we have discussed a number of different psychological concepts and theories. For your paper you will be asked to connect a real life experience or observation with a concept or theory from lecture and/or your textbook. Your assignment should include

Issues and Trends in Curriculum Development

 Learning Materials: • Iwasiw, C., Goldenberg, D., & Andrusyszyn, M. (2009). Curriculum development in nursing education (2nd ed.). Boston: Jones & Bartlett. (Chapters 13 and 14) • Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapters 16 and 17) PowerPoint • Chapter 13

Foundation of Nursing Module 2.1 ( Discussion)

Module 2.1 – Discussion Nursing Theories and Theorists Instructions: After reading the assigned chapters, please post two discussion questions based on the readings along with your answers to the following questions: Did any of the theories or theorist influence your own personal theory of nursing; and consequently, your own view