NTW600 Assignment 3 S3-2023
NTW600 Assignment 3 S3-2023
There are two major tasks that students are supposed to perform in this assessment.
1- Social engineering attacks - Mass Mailer Attack
2- SSL Stripping and ARP Spoofing in Kali Linux
Social engineering attacks are one of the top techniques used against networks today. Why spend days,
weeks, or even months trying to penetrate layers of network security when we can just trick a user into
running a file that allows us full access to their machine and bypass antivirus, firewalls, and many
intrusion detection systems? This is most commonly used in phishing attacks today, craft an e-mail or
create a fake website that tricks user into running, malicious file that creates a backdoor into their
system.
In this assessment student will use Kali Linux which includes one of the popular social engineering
attack toolkit available, Devid kennedy's Social Engineering Toolkit (SET). More recently several non-
social engineering tools have also been added to SET making it a very robust attack tool.
Follow the steps to generate a mailer attack.
After the successful installation, students are required to follow the steps outlined
setoolkit
We can see the Social-Engineering Attacks in the top of the menu, so we choose number 1 and hit
Enter. Then we will be displayed social engineering options as we can see in the following
screenshot:
Here in this lab we choose options 5. That is Mass Mailer Attack.
Step-3
One way a Social Engineer will attack a network is to send out a flood of e-,ails to company address
and see who will respond or run the malicious attachment we sent with it.
For this example let's just send one. We press 1 and hit "Enter".
Step-4
Then we enter a target e-mail address. See the following screenshot
For this example, let's just send one. We press 1 and hit "Enter".
Now we select option 1 to use a Gmail account or another server. For this lab we will use a fake
Gmail account. The Gmail address and password must be correct.
Then we choose a spoofed name to use for the 'from' line of the message. Let's use
"[email protected]" so it look that it's from Google. Pay special attention to this field, as this
where the real social engineering takes place.
Now SET asks for the password of the Gmail account.
Then we press yes at the prompt "Flag this message/s as high priority ?"
We don't want to attach any malicious file so we choose "no" when prompt "Do you want to attach a
file ?"
Now type-in a fake message, preferably one that will entice our victim to click on a malicious link
included or entice them surf to a malicious web page.
In actual defense practice this could just be a test webpage that records the IP address of those who
were tricked to surf to the page. That way as a security expert we know who in our organization needs
to be better educated on the risks of malicious e-mails.
When finished we type "END" in the last line. Just like following screenshot.
Then press "Enter" and SET will send out the e-mail to victim.
The message in above screenshot is obviously a silly fake, but something like this (With a much more
believable message ) could be used to test employee's ability to detect, resist and report phishing
attempts.
So far we have just sent a fake e-mail that could redirect someone to a bogus site. But if we could
make a fake site that offered up a booby script, and if the user allows the script to create shell with the
user.
*Note that some SMTP servers may require authentication, and you'll need to provide valid
credentials for successful delivery.
Students are expected to follow all the steps to generate fake email during the lab work activity in
week 6, the final online submission would be a file containing all the step-by-step procedure with the
screenshots of the work on Moodle.
Pat-2 SSL Stripping and ARP Spoofing in Kali Linux
SSL Stripping and ARP Spoofing are two common techniques used in network security attacks.
They are often employed by attackers to intercept and manipulate network traffic, particularly
in scenarios where Secure Sockets Layer (SSL) encryption is used for secure communication.
SSL Stripping: SSL Stripping is an attack method that aims to downgrade a secure HTTPS
connection to an insecure HTTP connection, making the traffic susceptible to interception and
manipulation. The attacker typically acts as a Man-in-the-Middle (MitM) by intercepting the
communication between the client and the server. The attack involves the following steps:
a. The attacker sets up a rogue access point or performs DNS spoofing to redirect the victim's
traffic through their own device.
b. The attacker intercepts the initial HTTPS request from the victim and responds with a
modified HTTP response instead of the expected HTTPS response.
c. The attacker then establishes an HTTPS connection with the server on behalf of the victim,
making the victim unaware of the downgrade.
d. Throughout the communication, the attacker intercepts and relays the traffic between the
client and the server, potentially capturing sensitive information.
Kali Linux, being a powerful penetration testing and security auditing platform, can be used to
perform SSL stripping attacks. Tools like "sslstrip" and "Bettercap" are commonly used in Kali
Linux for this purpose.
ARP Spoofing: ARP (Address Resolution Protocol) Spoofing, also known as ARP Poisoning,
is an attack technique used to manipulate the ARP table in a local network. The attack allows
the attacker to redirect network traffic meant for a specific IP address to their own device. The
steps involved in an ARP Spoofing attack are as follows:
a. The attacker sends falsified ARP messages to the target network, associating their own MAC
address with the IP address of another device on the network, such as the default gateway or a
specific target.
b. As a result, the target network starts sending its traffic to the attacker's device, believing it
to be the legitimate destination.
c. The attacker can then intercept and manipulate the traffic as desired, potentially capturing
sensitive data or launching further attacks.
In Kali Linux, various tools like "Ettercap" and "arpspoof" are available for performing ARP
Spoofing attacks. These tools allow the attacker to sniff network traffic, intercept packets, and
manipulate them.
Structure Diagram:
These types of attacks can be done in public networks. A malicious user can also make their
personal WI-FI network and when anyone gets connected to the network they perform
credential theft attacks on bank accounts or any other malicious activity.
In this assessment student will use Kali Linux which includes one of the popular social
engineering attack toolkit available by following the steps bellow.
Step 3: Type the following command in the terminal and hit enter to install dsniff:
$ apt install dsniff
Step 6: Type the following command in the terminal and hit enter for IP table configuration:
Step 7: Type the following command in Terminal and hit enter for finding out the gateway IP
of our router.
$ route -n
This will show our gateway IP address. In our case gateway, IP is 10.0.2.1 Step 8: Type the
following command in the terminal and hit enter for finding out targets in the network –
$ nmap -sS -O <gateway ip>/24
In our case gateway, IP is 10.0.2.1 so we will use this gateway IP for our task-
$ nmap -sS -O 10.0.2.1/24
This will scan and show all IP of the router and based on the scan result we can identify our
target. In our case, we want to attack the second VM machine which is Windows so we will
open VM Windows.
Step 9: Open up the command prompt of VM Windows and type ipconfig and hit enter:
$ ipconfig
This will show our VM Windows IP as well as the gateway. Here we can also verify our
gateway IP address.
In our case, VM Windows IP is 10.0.2.5
Step 10: Now open up a new terminal with root access in Kali Linux and type the following
command and hit enter.
This will start the arpspoof of our target machine.
$ arpspoof -i <interface> -t <target IP> -r <gateway IP>
in our case that is
$ arpspoof -i eth0 -t 10.0.2.5 -r 10.0.2.1
Now the arp spoofing is started.
Step 11: Without closing the arpspoof terminal open up a new terminal with root access and
type the following command in the terminal and hit enter:
$ sslstrip -l 8080
Step 12: Now open up the targeted Windows browser and type any web page name. In our
case we type https://instagram.com it will go to the login page of Instagram and we are
going to enter random data and click the login button.
This data will be captured by the sslstrip.log file in our Kali Linux system.
Step 13: Now open up a new terminal in Kali Linux with root access and type the following
command in the terminal and hit enter.
$ cat sslstrip.log
this will show captured data. In this way, we can perform SSL Stripping and ARP Spoofing
in our Kali Linux system.
Title: Case Study Report: Software Development Process and Budget Control System
• Explain the purpose of the report and the importance of addressing the
provided questions.
• Part-1 (25)
• Part-2 (25)
• Perform practically all the steps mentioned in “Part-2 SSL Stripping and
ARP Spoofing in Kali Linux” in your systems (laptops), take a screenshot
of your Kali results with each step.
4. Conclusion (5)
• Reiterate the significance of the topic and the relevance of the contents.
5. References
• Include a list of all the sources cited in the report, following a consistent
citation style (IEEE referencing style).
6. Appendices (optional)
Each student is required to present their work in front of the class during week 11.
This presentation should involve a demonstration of your technical work using Kali
Linux on your system. Make sure your presentation will be conducting during the
class followed by a technical viva on your project. The following week, week 12,
marks the submission deadline for your report. Failure to present your work as
scheduled could result in a failing grade for the entire assessment.
Submission Details
• This is an individual assessment.
• You must submit your report in a word or pdf PIA format on the Turnitin link
available on the Moodle.
• The assessment carries 30% weightage and is marked out of 100.
• Your similarity index should be less than 20%. However, if the plagiarism
percentage exceeds 25%, your assessment will undergo a thorough
investigation, and it may result in a deduction of marks or even a failing grade.
NTW600 Assessment # 3 Marking Rubric: Generation of Mass Mailer Attacks, Striping and Spoofing by
Using Kali Linux
Marking F (Fail) P (Pass) C (Credit) D (Distinction) HD (High Distinction)
Introduction/ Overview Unsatisfactorily or Fairly conveys the Accurately conveys Accurately conveys Accurately Plus
of the topics unclearly conveys the report topic. the report topic. the project topic, concisely conveys the
topic of the technical Some relevance Some relevance methods. Generally project topic, methods.
report. and briefly and briefly relevant and Generally relevant and
This is not relevant to presented. presented. analysed. Good analysed. Good
the assignment topic. Poor introduction Poor introduction of analysis of the case analysis of the case
(10) Completely unable to of the assignment the assignment study of conveys the study of conveys the
introduce Mass Mailer topic. topic. report topic. report topic. Accurately
Attack, arp spoofing Poorly introduce Poorly introduce Accurately introduce introduce Mass Mailer
and stripping. Mass Mailer Mass Mailer Attack, Mass Mailer Attack, Attack, Arp spoofing
Attack, Arp Arp spoofing and Arp spoofing and and stripping.. Excellent
spoofing and stripping. stripping. overview of the case
stripping. study or accurately
provided a background
of the study.
Analysis and Technical Unable to install kali Poorly presented Accurately Successfully Excellently performed
Findings Linux, unable to the technical stuff. presented the performed the the complete activity,
conduct any kind of Able to install kali technical stuff. Able complete activity, presented the technical
Part-1 Social Mass Mailer Attack, Linux, partially to install kali Linux, presented the stuff. install kali Linux,
engineering attacks - stripping, or ARP conducted any kind partially conducted technical stuff. Able Conducted Mass Mailer
Mass Mailer Attack spoofing attacks. No of Mass Mailer any kind of Mass to install kali Linux, Attack, stripping, or
Attack, stripping, or Mailer Attack, Conducted Mass ARP spoofing attacks.
Pat-2 SSL Stripping and outcomes from the Kali ARP spoofing stripping, or ARP Mailer Attack, Outcomes are
ARP Spoofing in Kali are presented. attacks. Outcomes spoofing attacks. stripping, or ARP completely described/
Linux are not completely Outcomes are not spoofing attacks. all the steps from each
described/ Missed completely Outcomes are part of the assessment
more than half described/ Missed completely described/ has been finalised.
steps of the task-1 few steps from each all the steps from Fabulously presented
(50 = 25+25)
and task-2 part of the each part of the the analysis of the
assessment. assessment has been outcomes.
finalised.
Solutions/ Argument is confused Adequate cohesion Mostly consistent Consistency logical Logic is clear and easy
and disjointed in and conviction in logical and and convincing. to follow with strong
Conclusion/referencing recommendations. recommendations. convincing. Clear referencing arguments. Solutions to
Lacks consistency with Sometimes clear Generally good style. Clear the problem are
(15)
many errors. Weak referencing style. referencing style. Conclusion accurate.
Conclusion Weak Conclusion Well augmented Clear styles with
conclusion excellent source of
references. Concrete
conclusion
Demonstrations Demonstration is Adequate cohesion Mostly consistent Consistency logical Logic is clear and easy
confused and and conviction. logical and and convincing. show to follow with strong
In-class Presentations disjointed. Lack of show a poor convincing. show a a good knowledge arguments.
knowledge about the knowledge about limited knowledge about the design
(25) show a strong
design, implementation, the design, about the design implementation, and
and development implementation, implementation, and development process knowledge about the
process and development development design implementation,
process process and development
process
Blank Page