1 of 23

Credential Harvesting Attack

Using Kali Linux SEToolkitoolkit

by Jaco Kirsten

University of Denver Cybersecurity Bootcamp, Bootcon, Project 4

2 of 23

Project Goal:

To successfully employ a credential harvesting attack vector of the Social Engineering Toolkit, or SEToolkit, on Kali Linux.

3 of 23

Why a Credential Harvesting Attack?

This is a form of social engineering that is surprisingly common and easy to perform with the right tools. It was also one of the few topics that wasn’t covered during the Bootcamp.��We’ve all heard about phishing. But I didn’t know how these attacks actually function. How are they employed? How do they achieve their goal? And would I be able to execute one in a safe laboratory environment?��So I set out to perform some Google-Fu, and enlighten myself about this uptil now unfamiliar subject.��

4 of 23

What exactly is Social Engineering Toolkit?

The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around Social-Engineering via Kali Linux.

It has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over 2 million downloads, it is the standard for social-engineering penetration tests and supported heavily within the security community.

It is aimed at leveraging advanced technological attacks in a social-engineering type environment. �

5 of 23

Security concepts applied:

Credential Harvester is just one of the methods in SET. It is used when you don’t want to specifically get a shell, but perform phishing attacks to obtain usernames and passwords from the system.

In this attack vector, a website will be cloned, and when the victim clicks on the URL to the fake sign in page and enters their user credentials, the username and password will be displayed in real time in SEToolkit.

After that, the victim will be redirected back to the legitimate site.

6 of 23

Research

Through internet research I figured out that SEToolkit is an easy way to perform a phishing attack. Just download install it on your Kali Linux machine and you’re good to go.

In real life you’d mail the fake link to an unsuspecting victim to click on, but in my case I did it on one of the Kali machines in an Azure labs, clicking on my own link to demonstrate how SEToolkit receives the data the victim of a phishing attack would enter.��Here’s a good SEToolkit tutorial:

https://www.yeahhub.com/setoolkit-credential-harvester-attack-tutorial/

7 of 23

Useful SEToolkit links and references:

8 of 23

Installation and configuration

Do the following in Kali Linux:

  1. In Desktop, run cd /Desktop
  2. Run mkdir SEToolkit
  3. Run cd SEToolkit
  4. Run git clone https://github.com/trustedsec/social-engineer-toolkit setoolkit/
  5. Run cd setoolkit
  6. Run pip3 install -r requirements.txt
  7. Run python setup.py
  8. Setoolkit will ask ‘y’ or ‘n’. Type ‘y’ and your social engineering toolkit will run
  9. After that just run ‘setoolkit’ to open program

9 of 23

So you want to perform a

Credential Harvesting Attack?

Simply follow the next 10 easy steps:

10 of 23

Step 1: Open SEToolkit on Kali Linux

11 of 23

Step 2: Get your IP address

12 of 23

Step 3: Choose Attack Vector

13 of 23

Step 4: Website Attack Vector

14 of 23

Step 5: Choose Credential Harvester Attack

15 of 23

Step 6: Choose Web Template

16 of 23

Step 7: Select Twitter

17 of 23

Step 8: Set IP address

18 of 23

Step 9: Enter my IP address into fake Twitter template

19 of 23

This link is then sent via an email to an unsuspecting victim with a message along the lines of:

“Due to a safety breach you immediately need to log into your Twitter account to update your info. Click here.”��When they open the fake Twitter login page and enter their credentials, the following happens…

20 of 23

Step 10: Target enters username and password…

21 of 23

Result!

  1. I get to see the victim’s username and password
  2. The fake Twitter login page’s URL reverts back from my IP address to twitter.com, making it much less likely that the victim will know they were conned.

22 of 23

Mitigation:

Never click on suspicious links! In other words, if you haven’t asked for some kind of password reset or had any communication with an account, it is HIGHLY UNLIKELY that they’ll send you a link via email to verify your details again.��Also educate employees as to the severe cybersecurity risk of phishing emails.

23 of 23

Video of Credential Harvesting Exploit: