SlideShare a Scribd company logo
Lab-12: Social Engineering and Physical Security
The first section of Lab-11 will be different than what you have
been doing in the Labs till today. You will search your junk e-
mail folder to find a spam/phishing e-mail and provide insights
on the discovered e-mail. Please be careful and don’t click in
the links in the e-mail you found. The second section of the lab
is a simulation of a physical security breach. It shows how
things can be more comfortable for malicious users and
especially for an insider when physical security is not
strong.Section-1: Social Engineering Lab
Social engineering attacks are usually performed case by case,
meaning that it is not generally possible to automate and scale
the tasks. Because it requires interacting with people in person
or over the phone. The main goal is to convince people to do
something for the hacker, such as sharing a password, doing
some configuration, etc. Phishing e-mails is one of the methods
that hackers can use in social engineering campaigns. Phishing
e-mails can be regarded as a scalable and automated way of
making social engineering attacks.
Phishing e-mails are considered spam/junk e-mail by most e-
mail service providers such as Gmail and Outlook.
Advanced and targeted phishing e-mails may harm your
computer, even if you haven't clicked on any link in the e-mail,
meaning that just opening the e-mail might harm your computer.
These kinds of phishing e-mails use the browser or e-mail
client's vulnerabilities on which you open the e-mail.
Important: Before starting this lab,
make sure that
your browser and e-mail client is up-to-date. Check
your antivirus definition database to confirm that it is up-to-
date. You can also consider using Kali VM on your computer
for this lab; the only thing is that you will have to log in to your
e-mail service from the browser.
After completing all of these pre-checks:
1) Go to your spam/junk e-mail folder
2) Find a phishing/spam e-mail
Be cautious and don’t click any link as it may contain links to
malicious websites and files
3)
Take a screenshot of the phishing/spam e-mail
4) Explain why it is a spam e-mailSection-2: Physical Security
Lab
Physical security can be considered as an essential aspect of
cybersecurity. From a technical perspective, it is usually easier
to steal information from a physically not secured
device/environment than from a physically secured
device/environment. In addition to conventional physical
security countermeasures, computer hard drives should be fully
encrypted. BIOS access should be restricted by a password.
Computers should be configured not to boot from external
media such as a USB. Otherwise, attackers with physical access
can boot the system from his/her media and perform malicious
acts such as stealing information, installing rootkits, and wiping
hard drive.
Assume that you access the physical premises of a company by
exploiting the vulnerabilities in physical security procedures.
You bring your laptop with you (Kali Linux on Netlab
environment) and plug it to the company network. You assign
an IP address to your computer and finally access to the
network. The target is one of the Windows 7 computers in the
network. Your motivation is to steal the password hash of the
Administrator account on that computer. Because you know that
the company has been using the same password in different
systems. You already know the password of the ms user on
Windows 7.
Now follow the following steps to steal the password hashes.
1) Log in to Kali Linux on the Netlab Environment
Assume that this is your laptop, and you already gained access
to the company network.
2)
Open a terminal window and type
rdesktop 192.168.2.13 -r disk:tmp=/root/Desktop
This command will open a remote desktop connection to
Windows 7 Target and map the Desktop of root account on Kali
to Windows 7 Target so that as the attacker, you will be able to
copy the file with password hashes to the attacker computer
(Kali) easily.
3) Type yes for the “Do you trust this certificate?” question
4) You will see the login screen of the Windows 7 Target
5) Click Other User
6) Type username as
ms and password as
ms
7) Click the start menu, right-click on Command Prompt icon,
click on
Run as administrator, and click on Yes
8) Type
reg save HKLMSAM c:SAM and press enter
Reg is a built-in Windows command that helps system
administrators automate register administration tasks (such as
view, query, delete, import, export, change). At the hands of an
attacker, this tool can turn into a weapon like many other
system administration tools.
In this specific command, you export the portion of the registry
that stores username and password hashes of the accounts. But
it has an encryption layer, and you have to decrypt it to see the
usernames and password hashes.
9) Type
reg save HKLMSYSTEM c:SYSTEM and press enter
In this command, you export yet another critical portion of the
registry. In our context, you will get the syskey from this file
and use it to decrypt the SAM file you export in the previous
step.
10) Double click Computer icon on the desktop, open C drive
and confirm that SAM and SYSTEM files have been created.
11)
Select both files, right-click on them and click ‘Copy’
12) Revert to My Computer view as performed in Step-10. You
will see the Desktop of the root account on Kali is mapped as
tmp, as shown below.
13)
Paste the files you copied in the previous step into this
mapped drive.
14) Log out of Windows 7 Target
15) Confirm that SAM and SYSTEM files are on the desktop of
Kali
16) At the terminal windows, type
cd Desktop to change the directory to the Desktop
(Notice that D is capital)
17)
Type
samdump2 SYSTEM SAM in the terminal window to
extract the usernames and password hashes. The obvious next
step for an attacker would be to crack the Administrator
password by performing a brute force attack against hashes.
Take a screenshot of the terminal window showing the account
information.
Weekly Learning and Reflection
In two to three paragraphs (i.e., sentences, not bullet lists) using
APA style citations if needed, summarize, and interact with the
content covered in this lab. Summarize what you did as an
attacker, what kind of vulnerabilities did you exploit, what
might have prevented these attacks. Mention the attackers and
all of the targets in your summary. You can provide topologies,
sketches, graphics if you want. In particular, highlight what
surprised, enlightened, or otherwise engaged you. You should
think and write critically, not just about what was presented but
also what you have learned through the session. You can ask
questions for the things you're confused about. Questions asked
here will be summarized and answered anonymously in the next
class.
image1.png

More Related Content

Similar to Lab-12 Social Engineering and Physical Security The firs.docx

Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
ManjuAppukuttan2
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
Cal Bryant
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Muniba Bukhari
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
 
Ransomware
Ransomware Ransomware
Ransomware
Deepak Kumar (D3)
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
Andrew McNicol
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit Analysis
Symantec
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Suman Mia
 
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.pptAndrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
BUSHRASHAIKH804312
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
Mehedi Hasan
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
trendy updates
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)Sri Prasanna
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
parag101
 

Similar to Lab-12 Social Engineering and Physical Security The firs.docx (20)

Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.pptCHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
CHAPTER 3 BASIC DYNAMIC ANALYSIS.ppt
 
Password hacking
Password hackingPassword hacking
Password hacking
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ransomware
RansomwareRansomware
Ransomware
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Ransomware
Ransomware Ransomware
Ransomware
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
 
Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016Beyond Automated Testing - RVAsec 2016
Beyond Automated Testing - RVAsec 2016
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Symantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit AnalysisSymantec White Paper: W32.Ramnit Analysis
Symantec White Paper: W32.Ramnit Analysis
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
 
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.pptAndrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
Andrew and Zac RVA-Beyond-Automated-Testing-2016.ppt
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Security R U Totally Secure !
Security R U Totally Secure ! Security R U Totally Secure !
Security R U Totally Secure !
 
Firewalls (Distributed computing)
Firewalls (Distributed computing)Firewalls (Distributed computing)
Firewalls (Distributed computing)
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 

More from pauline234567

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
pauline234567
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
pauline234567
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
pauline234567
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
pauline234567
 
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docxINTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
pauline234567
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
pauline234567
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
pauline234567
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
pauline234567
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
pauline234567
 
InstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docxInstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docx
pauline234567
 
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docxInstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docx
pauline234567
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
pauline234567
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
pauline234567
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
pauline234567
 
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docxInstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
pauline234567
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
pauline234567
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
pauline234567
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
pauline234567
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
pauline234567
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
pauline234567
 

More from pauline234567 (20)

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
 
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docxINTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
 
InstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docxInstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docx
 
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docxInstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docx
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
 
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docxInstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
 

Recently uploaded

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Lab-12 Social Engineering and Physical Security The firs.docx

  • 1. Lab-12: Social Engineering and Physical Security The first section of Lab-11 will be different than what you have been doing in the Labs till today. You will search your junk e- mail folder to find a spam/phishing e-mail and provide insights on the discovered e-mail. Please be careful and don’t click in the links in the e-mail you found. The second section of the lab is a simulation of a physical security breach. It shows how things can be more comfortable for malicious users and especially for an insider when physical security is not strong.Section-1: Social Engineering Lab Social engineering attacks are usually performed case by case, meaning that it is not generally possible to automate and scale the tasks. Because it requires interacting with people in person or over the phone. The main goal is to convince people to do something for the hacker, such as sharing a password, doing some configuration, etc. Phishing e-mails is one of the methods that hackers can use in social engineering campaigns. Phishing e-mails can be regarded as a scalable and automated way of making social engineering attacks. Phishing e-mails are considered spam/junk e-mail by most e- mail service providers such as Gmail and Outlook. Advanced and targeted phishing e-mails may harm your computer, even if you haven't clicked on any link in the e-mail, meaning that just opening the e-mail might harm your computer. These kinds of phishing e-mails use the browser or e-mail client's vulnerabilities on which you open the e-mail. Important: Before starting this lab, make sure that your browser and e-mail client is up-to-date. Check your antivirus definition database to confirm that it is up-to- date. You can also consider using Kali VM on your computer for this lab; the only thing is that you will have to log in to your
  • 2. e-mail service from the browser. After completing all of these pre-checks: 1) Go to your spam/junk e-mail folder 2) Find a phishing/spam e-mail Be cautious and don’t click any link as it may contain links to malicious websites and files 3) Take a screenshot of the phishing/spam e-mail 4) Explain why it is a spam e-mailSection-2: Physical Security Lab Physical security can be considered as an essential aspect of cybersecurity. From a technical perspective, it is usually easier to steal information from a physically not secured device/environment than from a physically secured device/environment. In addition to conventional physical security countermeasures, computer hard drives should be fully encrypted. BIOS access should be restricted by a password. Computers should be configured not to boot from external media such as a USB. Otherwise, attackers with physical access can boot the system from his/her media and perform malicious acts such as stealing information, installing rootkits, and wiping hard drive. Assume that you access the physical premises of a company by exploiting the vulnerabilities in physical security procedures. You bring your laptop with you (Kali Linux on Netlab environment) and plug it to the company network. You assign an IP address to your computer and finally access to the network. The target is one of the Windows 7 computers in the network. Your motivation is to steal the password hash of the Administrator account on that computer. Because you know that the company has been using the same password in different systems. You already know the password of the ms user on Windows 7. Now follow the following steps to steal the password hashes.
  • 3. 1) Log in to Kali Linux on the Netlab Environment Assume that this is your laptop, and you already gained access to the company network. 2) Open a terminal window and type rdesktop 192.168.2.13 -r disk:tmp=/root/Desktop This command will open a remote desktop connection to Windows 7 Target and map the Desktop of root account on Kali to Windows 7 Target so that as the attacker, you will be able to copy the file with password hashes to the attacker computer (Kali) easily. 3) Type yes for the “Do you trust this certificate?” question 4) You will see the login screen of the Windows 7 Target 5) Click Other User 6) Type username as ms and password as ms 7) Click the start menu, right-click on Command Prompt icon, click on Run as administrator, and click on Yes 8) Type reg save HKLMSAM c:SAM and press enter Reg is a built-in Windows command that helps system administrators automate register administration tasks (such as view, query, delete, import, export, change). At the hands of an attacker, this tool can turn into a weapon like many other system administration tools. In this specific command, you export the portion of the registry that stores username and password hashes of the accounts. But it has an encryption layer, and you have to decrypt it to see the usernames and password hashes. 9) Type reg save HKLMSYSTEM c:SYSTEM and press enter
  • 4. In this command, you export yet another critical portion of the registry. In our context, you will get the syskey from this file and use it to decrypt the SAM file you export in the previous step. 10) Double click Computer icon on the desktop, open C drive and confirm that SAM and SYSTEM files have been created. 11) Select both files, right-click on them and click ‘Copy’ 12) Revert to My Computer view as performed in Step-10. You will see the Desktop of the root account on Kali is mapped as tmp, as shown below. 13) Paste the files you copied in the previous step into this mapped drive. 14) Log out of Windows 7 Target 15) Confirm that SAM and SYSTEM files are on the desktop of Kali 16) At the terminal windows, type cd Desktop to change the directory to the Desktop (Notice that D is capital) 17) Type samdump2 SYSTEM SAM in the terminal window to extract the usernames and password hashes. The obvious next step for an attacker would be to crack the Administrator password by performing a brute force attack against hashes. Take a screenshot of the terminal window showing the account information. Weekly Learning and Reflection In two to three paragraphs (i.e., sentences, not bullet lists) using
  • 5. APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you're confused about. Questions asked here will be summarized and answered anonymously in the next class. image1.png