Describe and compare the main types of spyware

Assignment Help Other Subject
Reference no: EM133014510

SBM4304 IS Security and Risk Management

LAB. Social Engineering Attack

Objective:

• Use and study and the Credential Harvester Attack under kali Linux operating system.
1) Overview of this lab

This lab demonstrates how to clone a target website and catch user credentials. One of the popular social engineering attack is to send a phishing link to the victim and tricks them to visit a website that's exactly look like a legitimate website. Once, a user logins to the clone website, the attacker can capture the user credentials.
In this lab, we will use the Social Engineering Tool (SET) at Kali Linux
We will use site cloning via Credential Harvester Attack Method to clone facebook.

2) Working Procedures
1. Open Kali Linux via virtual box and open the terminal as shown below
2. You have to login as a super user (root) using the following command:
sudo su
You have to enter the password: osboxes.org
3. Open a terminal and type setoolkit
4. Choose Social-Engineering Attacks (option 1), then choose Website Attack Vectors (Option 2), then choose Credential Harvester Attack Method (Option 3) and finally choose Site Cloner (option 2). You should see similar to the following figure.
5. Now it is asking for the IP address, where you would like to host the clone website. For the experiment purpose, we will use the IP address of your virtual machine (Kali Linux) and will host it there as shown in the figure below.
Kali Linux detects the IP address in your computer as in the figure above and suggested: [10.0.2.15]. Accept the suggested IP by pressing the enter key: .

Note, your VM may have different IP address.

6. Therefore, open another terminal use the command ifconfig to get the IP address of the computer. Please note, your IP address will be different than what is shown in the figure below.

7. After selecting the IP address, it will ask for the target website address to be cloned. For the experiment purpose, we will use Facebook website.

Testing:
8. Open the browser (Firefox ESR) under the Kali Linux as follows:

- Select that show at the top left corner of Kali Linux screen.
- At the search bar type Firefox and select Firefox ESR as shown below:

9. by selecting such as Fire fox , type the IP address suggested by the Kali Linux in step 5 such as [10.0.2.15]. Please note, your IP address may be different. Try to login to facebook as shown below:

a. Describe and compare the main types of spyware.
b. Discuss DDoS and explain its method of operations.
c. Identify and explain the main difference between virus, warm and trojan hour types of malwares.

Research to find software and hardware that can be used to hack into a computer system. Summarize your research in a table to include the name of the software, free or payed software, type of malware and it is working mechanism.

Attachment:- IS Security and Risk Management.rar

Reference no: EM133014510

Questions Cloud

What are the relevant costs for Ruby : Gem Inc. has contacted Ruby with an offer to sell 5,000 of the subassemblies for P1,350 each. What are the relevant costs for Ruby
Stages of the software engineering process : Develop components of the Software Specification and Design Documents discussed in lectures. Student groups should be formed by Session five
Should your company replace its year-old machine : The opportunity cost of capital for this type of equipment is 12%. Should your company replace its year-old machine
Prepare an income statement for the month of October : Teal Mountain Inc., a provider of consulting services, was founded on October 1, 2022. Prepare an income statement for the month of October
Describe and compare the main types of spyware : Describe and compare the main types of spyware - Discuss DDoS and explain its method of operations and Identify and explain the main difference between virus
What is the one year real rate of interest : Treasury bills are yielding 6.87%. Based on the domestic Fisher effect (actual, not approximation), what is the one year real rate of interest
What are the equivalent units of production for conversion : As of September 1, the beginning WIP Inventory was 45% completed as to labor and overhead. What are the equivalent units of production for conversion
Discuss potential dangers of a cyberterrorist attack : What are the differences between cyberterrorists, hactivists, and state-sponsored attackers and Describe cyberterrorism and discuss potential dangers
What is the cost assigned to job at the end of the week : Assignment of $500 of raw materials inventory to Job 5. What is the cost assigned to Job 5 at the end of the week

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd