Describe and compare the main types of spyware

Assignment Help Other Subject
Reference no: EM133014510

SBM4304 IS Security and Risk Management

LAB. Social Engineering Attack

Objective:

• Use and study and the Credential Harvester Attack under kali Linux operating system.
1) Overview of this lab

This lab demonstrates how to clone a target website and catch user credentials. One of the popular social engineering attack is to send a phishing link to the victim and tricks them to visit a website that's exactly look like a legitimate website. Once, a user logins to the clone website, the attacker can capture the user credentials.
In this lab, we will use the Social Engineering Tool (SET) at Kali Linux
We will use site cloning via Credential Harvester Attack Method to clone facebook.

2) Working Procedures
1. Open Kali Linux via virtual box and open the terminal as shown below
2. You have to login as a super user (root) using the following command:
sudo su
You have to enter the password: osboxes.org
3. Open a terminal and type setoolkit
4. Choose Social-Engineering Attacks (option 1), then choose Website Attack Vectors (Option 2), then choose Credential Harvester Attack Method (Option 3) and finally choose Site Cloner (option 2). You should see similar to the following figure.
5. Now it is asking for the IP address, where you would like to host the clone website. For the experiment purpose, we will use the IP address of your virtual machine (Kali Linux) and will host it there as shown in the figure below.
Kali Linux detects the IP address in your computer as in the figure above and suggested: [10.0.2.15]. Accept the suggested IP by pressing the enter key: .

Note, your VM may have different IP address.

6. Therefore, open another terminal use the command ifconfig to get the IP address of the computer. Please note, your IP address will be different than what is shown in the figure below.

7. After selecting the IP address, it will ask for the target website address to be cloned. For the experiment purpose, we will use Facebook website.

Testing:
8. Open the browser (Firefox ESR) under the Kali Linux as follows:

- Select that show at the top left corner of Kali Linux screen.
- At the search bar type Firefox and select Firefox ESR as shown below:

9. by selecting such as Fire fox , type the IP address suggested by the Kali Linux in step 5 such as [10.0.2.15]. Please note, your IP address may be different. Try to login to facebook as shown below:

a. Describe and compare the main types of spyware.
b. Discuss DDoS and explain its method of operations.
c. Identify and explain the main difference between virus, warm and trojan hour types of malwares.

Research to find software and hardware that can be used to hack into a computer system. Summarize your research in a table to include the name of the software, free or payed software, type of malware and it is working mechanism.

Attachment:- IS Security and Risk Management.rar

Reference no: EM133014510

Questions Cloud

What are the relevant costs for Ruby : Gem Inc. has contacted Ruby with an offer to sell 5,000 of the subassemblies for P1,350 each. What are the relevant costs for Ruby
Stages of the software engineering process : Develop components of the Software Specification and Design Documents discussed in lectures. Student groups should be formed by Session five
Should your company replace its year-old machine : The opportunity cost of capital for this type of equipment is 12%. Should your company replace its year-old machine
Prepare an income statement for the month of October : Teal Mountain Inc., a provider of consulting services, was founded on October 1, 2022. Prepare an income statement for the month of October
Describe and compare the main types of spyware : Describe and compare the main types of spyware - Discuss DDoS and explain its method of operations and Identify and explain the main difference between virus
What is the one year real rate of interest : Treasury bills are yielding 6.87%. Based on the domestic Fisher effect (actual, not approximation), what is the one year real rate of interest
What are the equivalent units of production for conversion : As of September 1, the beginning WIP Inventory was 45% completed as to labor and overhead. What are the equivalent units of production for conversion
Discuss potential dangers of a cyberterrorist attack : What are the differences between cyberterrorists, hactivists, and state-sponsored attackers and Describe cyberterrorism and discuss potential dangers
What is the cost assigned to job at the end of the week : Assignment of $500 of raw materials inventory to Job 5. What is the cost assigned to Job 5 at the end of the week

Reviews

Write a Review

Other Subject Questions & Answers

  What extent does kevin carter pulitzer prize-winning

What extent does Kevin Carter's Pulitzer Prize-winning photograph have artistic form? How do you measure the intensity of your experience in response

  How do trustworthy and ethical leaders enhance knowledge

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations?

  Focus the interviewee on the pertinent issue

Review the article - Learning Solution-Focused Interviewing Skills: BSW Student Voices - clarify issues and feelings. Interview questions must lay a foundation

  Discuss the use of external resources

Using external resources to gauge compensation levels may result in more equitable compensation planning. From the e-Activity, assess how you would integrate.

  What would be job one

If the next president were to appoint a Cabinet member to worry about future generations, what would be 'Job One'? Got an idea

  Determining unofficial actors

Many members of the news media say that they are just a "mirror" of society and that they simply reflect what happens in society. Do you agree and why?

  Describe the role of the federal reserve bank

The Federal Reserve Bank (the "Fed") is the central bank of the United States. One of its jobs is to manage the money supply. Sometimes it increases the money.

  What conclusions can be drawn from the study

Choose 4 articles on your paper topic (from the list you submitted or new ones that you found since then). The articles must be research studies.

  Consequences of the code of hammurabi for ancient society

What were the consequences of the Code of Hammurabi for ancient society, and how does this system of justice compares to modern American laws?

  How employees are recruited and selected by the organization

Describe the organization as a whole and a specific job within this organization. Is there a formal job description? Include a complete job description.

  Problems related to senate versus house

Discuss the reasoning of your response and support your response with at least one scholarly source.

  Bartky and bordo envisage modern disciplinary power

Foucauldian power reduces individuals to docile and subjected bodies and thus seems to deny the possibility of freedom and resistance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd