Module 6 Lab
Module 6 Lab
In this lab, you are required to complete an online tutorial on data store attacks, followed by the Social Engineering Toolkit on Kali.
Report requirements
• Include your name and lab title at the top of the report.
• Number the questions and answers and answer each question in your lab report in sequence.
• For each response, include the required text as well as all necessary and appropriate screenshots while performing the task. Crop
the screenshots as necessary so that the text in the images are properly visible.
o You may use the Snipping Tool on Windows to take screenshots from your PC, by clipping the area on the virtual machine
screen. If you are using a Mac PC, press and hold together: Shift, Command, and 4, to enable the selection cursor for
capturing screenshots.
• At the end of your report, write a brief reflection of the lab exercise
o What was the most valuable feature of the lab?
o What did you learn from this experience?
o Which concepts and terminology could you relate from the theoretical content to this lab experience?
o How did you prepare for this lab?
o What changes are you considering in preparing for your next lab?
• Use black font color for texts
• If uploading an MSWord format file, view the uploaded file from Canvas to make sure that the layout of images and texts are not
overlapping in the report. If the contents seem to have moved around, upload a pdf instead of an MSWord file.
Part 1: Online Tutorial on Data Store Attacks
You will complete a free-to-use online web-based tutorial tool on attacking data stores.
The report should include the following points for both the tutorials:
Feel free to use screenshots to explain the above points in the report. However, please do not use a series of screenshots copied-
and-pasted in the report, without proper explanation. The explanations and discussions should be the primary content, and the
screenshots may be used for better illustration.
Follow through with the tutorial till the end of the tutorial.
Submit a screen shot of the final page when the tutorial is complete and you see the following message:
“Phew. Now we know how SQL INJECTION works, let’s learn how to protect against this kind of attack.”
Part 2: Launching a Social Engineering Attack
Social engineering attacks exploit human-human interaction, leading to the revelation of confidential digital information. The Social
Engineer Toolkit (SET) is an automated tool with integrated features for launching social engineering attacks through various
methods. Here, we will launch a social engineering attack leading to a compromised system.
Target: Windows VM
Downloading and placing the correct Firefox version in an accessible location on your Kali VM
• Log in to your Kali Linux VM and open the web browser application (use the Application menu on the top-left corner)
➢ Browse to the following URL: https://ftp.mozilla.org/pub/firefox/releases/43.0/win32/en-US/
➢ Download and save Firefox Setup 43.0.exe
➢ By default, the file will be saved in your /home/student/Downloads directory.
• Open a command line terminal and run the following commands
➢ cd /home/student/Downloads (browse to the directory where the file is downloaded)
➢ mv Firefox\ Setup\ 43.0.exe Firefox43.exe (rename the file for convenience)
➢ sudo cp Firefox43.exe /usr/share/doc/firefox-esr/ (copy the file to usr/share/doc/firefox-esr)
• Next, we will install and run an open FTP server to allow us to transfer the file to the Windows VM
• Run the following commands from your command line terminal
➢ sudo apt-get install python3-pyftpdlib (install Python-based FTP server on Kali)
➢ python3 -m pyftpdlib (runs the FTP server)
➢ By default, the FTP server should start running on port 2121
➢ Do not close the command line terminal
Setting up a disposable web-based email address from your Windows VM for the target victim user
• For this social engineering attack, we will use a disposable email address, which we will access from our Windows VM.
• Log in to your Windows VM and launch the Mozilla Firefox web browser from the Desktop
• Browse to the following URL: https://www.guerrillamail.com
• You may need to add the security exception for untrusted connection.
• The top-bar will display something similar as shown in this image:
• Click on the button with the random string, and you will be able to define an email ID yourself. Click on “ set” when done.
• Use the drop-down to select a suitable email domain as per your preference.
• Your disposable email address is now set up (will be referred from this point as the victim’s email address)
• Do not close the browser window.
• You may send an email from any account to your chosen disposable email address and verify it being received here.
Phase B: Launching a Social Engineering Attack
In this phase, we will send a phishing email from our Kali VM to our targeted victim user.
• Log in to your Windows VM and view the Firefox browser window which you had running form before.
• Wait for the inbox to refresh or manually refresh the page till you receive the email which the attacker had sent.
➢ View the email and click on the attachment.
➢ You may be asked to save the file, so proceed with the file being saved.
➢ The prompt may warn that it consists of an executable. Ignore and click on Open.
• The victim will be displayed a blank PDF file. However, the payload has already done its job!
Next, on the other end, we know that the attacker is waiting with the Meterpreter session.