Eh - Unit-4
Eh - Unit-4
Eh - Unit-4
SNIFFING:
Sniffing is the process of monitoring and capturing all the packets passing through a
given network using sniffing tools. It is a form of “tapping phone wires” and get to know
about the conversation. It is also called wiretapping applied to the computer networks.
Email traffic
FTP passwords
Web traffics
Telnet passwords
Router configuration
Chat sessions
DNS traffic
How it works:
A sniffer normally turns the NIC of the system to the promiscuous mode so that it
listens to all the data transmitted on its segment.
Promiscuous mode refers to the unique way of Ethernet hardware, in particular, network
interface cards (NICs), that allows an NIC to receive all traffic on the network, even if it
is not addressed to this NIC.
By default, a NIC ignores all traffic that is not addressed to it, which is done by
comparing the destination address of the Ethernet packet with the hardware address
(a.k.a. MAC) of the device.
Types of Sniffing:
Sniffing can be either Active or Passive in nature.
Passive Sniffing:
In passive sniffing, the traffic is locked but it is not altered in any way. Passive sniffing
allows listening only. It works with Hub devices.
On a hub device, the traffic is sent to all the ports. In a network that uses hubs to
connect systems, all hosts on the network can see the traffic.
Therefore, an attacker can easily capture traffic going through.
Active Sniffing:
In active sniffing, the traffic is not only locked and monitored, but it may also be altered
in some way as determined by the attack. Active sniffing is used to sniff a switch-based
network. It involves injecting address resolution packets (ARP) into a target network
to flood on the switch content addressable memory (CAM) table. CAM keeps track of
which host is connected to which port.
Following are the Active Sniffing Techniques −
MAC Flooding
DHCP Attacks
DNS Poisoning
ARP Poisoning
LAN Sniff – The sniffer attacks the internal LAN and scans the entire IP gaining
access to live hosts, open ports, server inventory, etc. A port-specific vulnerability
attack happens in LAN sniffing.
Protocol Sniff – The sniffer attacks occur based on the network protocol used.
Different protocols such as ICMP, UDP, Telnet, PPP, DNS, etc., or other protocols
might be used.
ARP Sniff – ARP Poisoning attacks or packet spoofing attacks occur based on the
data captured to create a map of IP addresses and associated MAC addresses.
TCP Session stealing – TCP session stealing is used to monitor and acquire traffic
details between the source & destination IP address. All details such as port
number, service type, TCP sequence numbers, data are stolen by the hackers.
Application-level sniffing – Applications running on the server are attacked to
plan an application-specific attack.
Web password sniffing – HTTP sessions created by users are stolen by sniffers
to get the user ID, password, and other sensitive information.
Social engineering :
Social engineering is a manipulation technique that exploits human error to
obtain private information or valuable data. In cybercrime, the human
hacking scams entice unsuspecting users to disclose data, spread
malware infections, or give them access to restricted systems. Attacks
can occur online, in-person, and by other interactions. Social
engineering scams are based on how people think and act.
o Fear
o excitement
o Curiosity
o Anger
o Crime
o Sadness
o
Identity theft:
Identity theft is the crime of obtaining the personal or financial information of
another person to use their identity to commit fraud, such as making unauthorized
transactions or purchases. Identity theft is committed in many different ways and
its victims are typically left with damage to their credit, finances, and reputation.
Identity theft occurs when someone steals your personal information and
credentials to commit fraud.
There are various forms of identity theft, but the most common is financial.
Identity theft protection is a growing industry that keeps track of people's credit
reports, financial activity, and Social Security Number use.
Impersonation:
Eavesdropping:
o Eavesdropping or unauthorized listening of conversations or reading of messages.
o Interception of audio, video, or written communication.
o It can be done using communication channels such as telephone lines, email, instant
messaging, etc.
Shoulder Surfing:
o Shoulder surfing uses direct observation techniques such as looking over someone's
shoulder to get information such as passwords, PINs, account numbers, etc.
o Shoulder surfing can also be done from a longer distance with the aid of vision
enhancing devices such as binoculars to obtain sensitive information.
Phishing:
An illegitimate email falsely claiming to be from a legitimate site attempts to acquire the
user's personal or account information.
Phishing emails or pop-ups redirect users to fake webpages of mimicking trustworthy
sites that ask them to submit their personal information.
Spear Phishing:
Spear phishing is a direct, targeted phishing attack aimed at specific individuals within
an organization.
In contrast to normal phishing attack where attackers send out hundreds of generic
messages to random email addresses, attackers use spear phishing to send a message
with specialized, social engineering content directed at a specific person or a small
group of people.
Spear phishing generates higher response rate when compared to normal phishing
attack.
Phishing:
Phishing is a type of Social Engineering attack that aims to obtain sensitive
information including the bank account number, usernames, passwords, and
credit card details. It is mostly done by sending fake emails that appear to have
come from a legitimate source..
The recipient is mostly manipulated to click a malicious link that can install
malware or access sensitive information.
.
Common Features of Phishing Emails:
SMS phishing: This is also a type of attack that makes the user reveal
information that can be related to the credit card details or some sensitive
information.
Just like other phishing attacks, this will also appear as a trusted source to
the victim. Android phones and smartphones are mostly used by every user
and this gives the opportunity to the attacker to perform this phishing attack.
It makes it easy for the attacker in avoiding the trouble of breaking firewalls
and stealing information.
The Social-Engineer Toolkit (SET) was created and written by Dave Kennedy, the
founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration
testing around Social-Engineering.
Known as SET, the Social Engineering Toolkit has been in wide use since its creation.
Written by Dave Kennedy from TrustedSec, it's an open source, free Python
cybersecurity tool used by security researchers, penetration testers, blue and purple
teams from around the world. Instead of targeting apps, SET uses humans as the main
target of its attack techniques.
It offers many brilliant features, including faking phone numbers, sending SMS, or
helping to create a phishing page by instantly cloning the original. Let's explore the full
powers of this toolkit:
Main features:
SET offers multiple attack vectors and techniques, and it's almost impossible to cover
them all in one article. However, we can highlight the main attacks here:
Phishing Attacks: This option allows you to choose from several phishing attack options
to help you decide how to approach your victim. You can craft email messages with
malicious payloads attached, and send them to a small or large number of recipients.
It also lets you spoof your email address by changing simple variables, which makes it
really easy to use.
Web Attack: This module combines different options for attacking your victim to
compromise the remote victim. It includes attack techniques such as Java Applet Attack
and Metasploit Browser Exploit to deliver malicious payloads. Also handy is the
Credential Harvester method, which lets you clone a website and harvest the
information from user and password fields, as well as the TabNabbing, HTA Attack,
Web-Jacking and Multi-Attack techniques, all with the same goal of tricking end users
into revealing their credentials.
Infectious Media Generator: This interesting option enables you to create an infected
media device (USB/CD/DVD) with an autorun.inf file, that can be later inserted into any
PC and will automatically run a Metasploit payload if autorun is enabled.
Create a Payload and Listener: By using the fourth option from the main menu, you'll be
able to create malicious payloads for Windows, including Shell Reverse_TCP,
Reverse_TCP Meterpreter, Shell Reverse_TCP X64 and Meterpreter Reverse HTTPS.
As you can see by the names, you'll be able to spawn command shells, create reverse
connections, tunnels, and more.
Mass Mailer Attack: This type of attack can be performed against one or multiple
individuals, even letting you import users lists to send to any people you wish. It also
lets you use a Gmail account for your email attack, or use your own server or open relay
for mass delivery.
Apart from these main options, you'll also find other useful attack choices such as
Arduino-Based, Wireless Access Point, QR Code Generator and Powershell Attack
Vectors.
Now that you have a general overview of the Social Engineering Toolkit, let's jump into
the fun part, installing and testing this software.
¶Installation
Installing the Social Engineering Toolkit is pretty easy with most operating systems. On
most Linux distros the manual installation can be performed by using the following
commands:
Once you have SET installed, you can easily invoke it from command line by typing:
./setoolkit