Professional Documents
Culture Documents
THEORY:
B] Computer-based social engineering attacks: These attacks use software tools and technologies to trick victims
into divulging sensitive information or performing actions that benefit the attacker. Some examples of computer-
based social engineering attacks include:
• Malware: Malware is malicious software that is designed to infiltrate a computer system or network and steal
sensitive information or perform unauthorized actions.
• Spear phishing: This type of attack is a targeted form of phishing that is aimed at specific individuals or
organizations. Attackers use personal information gathered from social media or other sources to create a
convincing message that appears to be from a trusted source.
• Watering hole attack: In this type of attack, the attacker targets a website or online platform that is
frequently visited by the victim, and infects it with malware. When the victim visits the site, they unwittingly
download the malware onto their computer system.
• Ransomware: Ransomware is a type of malware that encrypts the victim's files or data and demands payment
in exchange for the decryption key.
4. Explore Social Engineering Toolkit in Kali and perform a Credential HarvesterAttack (You can refer
manual shared earlier: Kali Linux Social Engineering)
Solution :
Conclusion : Hence done the study of Social Engineering attacks and learned Social Engineering Toolkit in
Kali and perform a Credential Harvester Attack by creating a clone facebook login page and extracting
login information when a user enters it .