Copy 1 Linux Task
Copy 1 Linux Task
0
“Table of Contents
1. Introduction:......................................................................................................................................2
1.1. History about social engineering attacks................................................................................2
1.2. Background Information........................................................................................................2
1.3. Objectives of the report...........................................................................................................2
2. Analysis and Technical Findings.......................................................................................................2
2.1 Part-1: Mass Mailer Attack.....................................................................................................2
2.1.1 Practical Execution..............................................................................................................2
2. 1. 2 Findings...................................................................................................................................5
2.2 Part-2: SSL Stripping and ARP Spoofing...............................................................................5
2.2.1 Practical Execution...................................................................................................................5
2. 2. 2 Findings...................................................................................................................................7
3. Solution to Prevent these Attacks.....................................................................................................7
3.1 Try to prevent the occurrence of mass mailer attacks:.................................................................7
3.2 Counter Measures against SSL Stripping and ARP Spoofing......................................................8
4. Conclusion..........................................................................................................................................9
References..................................................................................................................................................9
1
1. Introduction:
1.1. History about social engineering attacks.
The traditional way of doing this by finding software loopholes is being replaced with a plethora of tricks
on the part of cybercriminals to obtain unauthorized access to computer systems. This report would
describe three particular forms of social engineering attack. Mass Mailer Attack on the SSL Stripping and
ARP Spoofing contained in the Kali Linux environment. Different approaches and different results but
one common aim in all of these attacks was to probe human nature or the protocols of communication
networks to successfully access secured data.
2
enables the opening of the SET toolkit, required to form and run the phishing, or any other social
engineering solutions. When SET is live, a vast number of attack types are available, and they can be
tweaked further with the target and goal,
3
Figure 3: Email Attacks Within a Set
4
2. 1. 2 Findings
The efficiency of the attack; is however; dependent on the number of responses from the recipient after
launching the attack through the mass emails. If the users click on the link or the attachment received,
their systems are infected and attacker acquires full access to the users’ data. In relation to other type of
attacks, this type is rather powerful, because, hiding under the mask of trust, it is usually used to blunt the
initial stage of filters.
5
3. Launching the Attack: Initiate the attack and track the downgraded connections.
ARP Spoofing:
1. Setting up ARP Spoof: Intercept traffic between the target machine and the gateway with the
Arp spoof tool.
6
3. Monitoring the Traffic: Register the data that is transmitted through the compromised
connection.
2. 2. 2 Findings
SSL Stripping acknowledges secure connections and softens the connection hence making data in the
network exposed to eavesdropping and even modification. ARP Spoofing [4] allows an attacker to
intercept the communications between two parties allowing him to become a man-in-the-middle. The
combination of the two attacks is dangerous since, the first attacks facilitate the second attacks; one can
easily gain access to login details for the erstwhile encrypted channel.
7
2. Soft Employee Phishing, Awareness and Training
Therefore, such types of training including phishing simulations as well as follow up for employees
should be carried to ensure their awareness regarding cyber threats. Providing the staff on how they
should deal with phishing activities then the chances for such a hit are drastically reduced. I discovered
that, being exposed to phishing simulation the beneficial skills that one needs are trimmed and tested and
from this, these threats are not carried out.
3. Multi Factor Authentication as a Mitigation Strategies for Account Compromise.
Multi-Factor Authentication adopts the idea that before access into a resource is allowed there is a second
form of identification used. This enables even in the event that one aspect for example a password is
hacked then the hackers will not easily gain access. The most effective resource to provide safety in case
of the account breaches and protect the particular information is the MFA.
8
4. Conclusion
This technical report has also examined the practical practices of MMM, SSL Stripping and ARP
Spoofing in Kali Linux. They serve as a reminder of some of the worst mistake one can think about,
which can be exploited to gain illegitimate access to confidential information. Minding such types of
attack and also following to the advice within this write-up will ensure immense reduction in likelihood
of these break-ins occurring to organizations.
No other need for cyber security can be put more strongly particularly in the light of progressing
technology which has been responsible for the increase in the social engineering. It is not as easy as the
protection of information. it is about defending trust: privacy and the value of information technologies in
the ever-changing world.
References
[1] L. H. T. a. A. S. .. Allen, Kali Linux–Assuring security by penetration testing, Packt Publishing Ltd.,
2014.
[2] H. S. B. J. V. L. H. a. P. K. M. Gururaj, "Analysis of cyber security attacks using kali Linux.," In 2022 IEEE
International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)
(pp. 1-6). IEEE., 2022, April. .
[3] A. a. L. R. Thakkar, "Attack classification using feature selection techniques: a comparative study.,"
Journal of Ambient Intelligence and Humanized Computing, 12(1), pp.1249-1266., 2021.
[4] S. Whalen, An introduction to arp spoofing. Node99 [Online Document], 563., 2001.
[5] J. Z. S. a. C. J. Isaac, " Security attacks and solutions for vehicular ad hoc networks. IET
communications, 4(7), pp.894-903.," 2010. "