PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS
RELATED TO THIS LAB.
Evaluate what PhishTank Wants to hear about spam.
2. Does PhishTank protect you from phishing?
3. Why is Open DNS blocking a phish site that PhishTank doesn't list or
has not yet veriﬁed?
Internet Connection Required
CEH Lab Manual Page 689 Ethical Hacking and Countermeasures Copyright 0 by EC—Council
All Rights Reserved. Reproduction is Stdctly Prohibited]
Q The multi-attack
vector allows you to tum
on and 03 diﬂuent vectors
and combine the attacks all
into one spedﬁc
So when the user clicks the
link he will be targeted by
each of the attack vectors
you specify. One to
note with the attack vector
is you can't utilize
Harvester, or Web jacking
with the Man Left in the
Q The rnulti attack
vector utilizes uch
combination of attacks and
allows the user to choose
the method for the attack.
Once you select one of the
attacks, it will be added to
your attack proﬁle to be
used to stage the attack
vector. When yon’re
ﬁnished be sure to select
the Tm ﬁnished‘ option.
CEH Lab Manual Page 699
Log in | Fnnbonlr
sap Ilp Connect and share with ii. » ueople 1.. your He.
man or mum
‘mm; in a>-aupowuceooo:
Vomit mu‘ 2:5:/ .u'1‘
tngsrys "*V' 341 :74 , ..«: g 0.. . _-. n.I2;: gz gm. »m. g.e; a.. .; »mg. ;(». ... i
Fszcbaxiliil Natale hrdrmd: Bart: and: Fern: Fkcui 352:5’-U I'ea: ePewe Deletvers cum ’Ivo(v Slice: T51’:
~ rnginpmuok »
1- —> C’ ' hm>s. ’.www. lacebooIr¢ovrI/ Iouunphr:
‘I’ Dav-I--6-= °s'= °-= --= =-v= v°~n-nv-67
s-. ,. ll]: tunmnl . ... i.i. ... ».. i-i. ii. .4,. ... .,. w.. yuuru»
--= «-~«= rm
mg i rim ». ... . n
rndd us . —- -iv: man J| A’A ; a_m; . : ... ‘u ‘uluuznﬂoul r. ... .r. ... .
Msm. »nn: mna. mg“ mg. um. rum .1:-'nr1 , ..-. .vm n. ..: w= rm. .. wicuy me. .. love
FIGURE 3.16: Far. and Legitimate Faeebook login page
21. As soon the Victim types in the email address and password, the SET
Terminal in BackTrack fetches the typed user name and password,
which can be used by an attacker to gain unauthorized access to the
Ethical Hacking and Countermeasures Copyright 0 by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited]