Thursday, 7 October 2021

Everything to know about Virtual Machine

 A virtual machine is commonly known as VM, which behaves like a separate computer system. These are open-source applications that can be installed in any operating system. The virtual machine acts as a separate physical computer with different operating systems that we like to install (Ex: Windows, Linux, Ubuntu, macOS, etc..)

There are various virtual machines, some of the famous VM's are

  • VirtualBox
  • VMware
  • Boot camp
  • VMware Fusion (Mac)
  • VM Monitor


What are VMs used for?

  • Trying out a new operating system (OS), including beta releases.

  • Running software or apps on operating systems that they were not originally intended for.

  • Used in cybersecurity

Some benefits of using VMs?

  • Cost savings

  • Security benefits

  • Run multiple Operating Systems

Share:

Thursday, 30 September 2021

Phising Attack – Step by step Demo using Kali Linux

 Phishing Attack – Step by step Demo using Kali Linux



Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware(money).

We will create a Facebook phishing page using Social Engineering Toolkit which is preinstalled in Kali Linux OS. The phishing link can be sent to any user and the data that they enter on the fraud page will be stored in a file on the attacker’s machine.

Social Engineering Toolkit or SET for short is the standard for social engineering testing among security professionals and even beginners must have a basic idea about using the tool. Basically, it indicates a computer-based social engineering attack.

Steps of Phishing Attack:

  • Open the terminal window in Kali and make sure you have root access as ‘setoolkit’ needs you to have root access
  • Type ‘setoolkit’ in the command line
  • Type y to agree to the conditions and use the tool
  • A menu pops up. Enter 1 as the choice as in this demo we attempt to demonstrate a social engineering attack.

Under Social Engineering, there are various computer-based attacks and SET explains each in one line before asking for a choice.
  • Enter 3 which will select the ‘Credential Harvester Attack Method’ as the aim is to obtain user credentials by creating a fake website

Now, the attacker has a choice to either craft a malicious web page on their own or to just clone an existing trustworthy site.
  • Enter 2 in order to select ‘Site Cloner’
This might take a moment as SET creates the cloned page.

  • Now you need to see the IP address of the attacker machine.
  • Open a new terminal window and write ifconfig
  • SET will ask you to provide an IP where the credentials captured will be stored. Paste the address that you copied in the earlier step.
  • Since we chose to clone a website instead of a personalized one, the URL to be cloned is to be provided. In this example, it is www.facebook.com
  • Social Engineering Toolkit needs Apache Server running as captured data is written to the root directory of Apache. Enter y when prompted about starting the Apache process.
  • The setup for a phishing attack is complete, you have cloned Facebook and hosted it on the server
The IP address is usually hidden carefully by using URL shortener services to change the URL so that it is better hidden and then sent in urgent-sounding emails or text messages.
Go to browser and type http://yourIP (eg: http://192.0.0.0)

If an unsuspecting user fills in their details and clicks on ‘Log In’, the fake page takes them to the actual Facebook login page. Usually, people tend to pass it off as a glitch in FB or an error in their typing.

  • Scroll down and you can see the username and password.



Hope this gave you a basic idea of how phishing attacks work.

 

Share:

Creating a low-cost USB Rubber Ducky With Raspberry Pi Pico

Creating a low-cost USB Rubber Ducky With Raspberry Pi Pico






USB Rubber Ducky

USB Rubber ducky is a Human Interface Device that looks similar to a USB Pen drive.USB Rubber ducky cannot be detected by any Anti-Virus or Firewall as it acts as a Human Interface Device. It is used to inject malicious scripts, used to create remote access to a victim's PC, steal the victim’s credential data, and can inject payload to the victim’s computers.

Raspberry pi pico


Get one Pico board from here.

Process

  • Plugin the Rasberry pi pico into the USB port. It will show up as a device named RPI-RP2.
  • Copy the downloaded .uf2 file(circuit Python) to the root of the Pico (RPI-RP2).
  • It will reboot automatically, it will reconnect as CIRCUITPY.
  • Download adafruit-circuitpython-bundle-6.x-mpy-20210930.zip and extract it using Winrar.
  • Open lib in the recently extracted folder and copy adafruit_hid to the lib folder in your Raspberry Pi Pico.
  • Now open code.py delete the previous code and copy-paste the below code and save it.
Share: