type
status
date
slug
summary
tags
category
icon
password
Property
Jun 23, 2023 11:48 AM
🗒️实验任务
通过使用工具setoolkit来进行网络钓鱼,窃取用户信息
📱实验环境
- Virtual Box 6.1
- Kali 2022
- Lenovo 小新13Pro 自带Wifi-6 网卡
💻实验步骤
安装setoolkit
kali默认安装了setoolkit,若想重新安装,可输入:
使用手册
启动命令
setoolkit
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Ff7de327d-306f-4ada-8866-28d6116697a9%2FUntitled.png?table=block&id=d53a1512-ed2a-47b4-b1b4-0538ca24d1d3&t=d53a1512-ed2a-47b4-b1b4-0538ca24d1d3&width=624&cache=v2)
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fad13c3e6-a732-462f-b3a1-48cde6ba5dd8%2FUntitled.png?table=block&id=25eb9dba-ca10-4768-a32f-564b196e45b8&t=25eb9dba-ca10-4768-a32f-564b196e45b8&width=624&cache=v2)
菜单栏我们翻译一下,具体功能如下
社会工程攻击
渗透测试(快速跟踪)
第三方模块
💣实战测试
1.用setoolkit自带web钓鱼盗号
用社会工程攻击模块进行
- 选择网页攻击
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F71b4811b-1c1f-4d02-9661-2da00b8d4cc5%2FUntitled.png?table=block&id=4be9d4fd-4fd7-4e29-8ac5-332c514ed2da&t=4be9d4fd-4fd7-4e29-8ac5-332c514ed2da&width=672&cache=v2)
- 选择钓鱼网站攻击
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F1d1a4217-d885-4e32-a4e3-36d15bb57bab%2FUntitled.png?table=block&id=0f44d360-5592-4003-ae0f-0274a421efc9&t=0f44d360-5592-4003-ae0f-0274a421efc9&width=672&cache=v2)
- 选择网页模板
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F291cd210-18d0-4be0-a4fa-b834e8bb0891%2FUntitled.png?table=block&id=d485ce79-bea3-4aa2-af14-bdcca9987f24&t=d485ce79-bea3-4aa2-af14-bdcca9987f24&width=672&cache=v2)
- 输入本地IP地址
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fb713deba-cdb6-4878-805d-be40a2edb8d5%2FUntitled.png?table=block&id=abe07ea1-2678-4a45-90ef-5836d2fe1689&t=abe07ea1-2678-4a45-90ef-5836d2fe1689&width=672&cache=v2)
- 选择钓鱼网站模块,例如Google或者Twitter登录页
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F3b865a7b-8726-41ed-b0c1-7a0b2dbf6110%2FUntitled.png?table=block&id=7772d3bd-c2c8-4d45-b8e4-e725cf7a691c&t=7772d3bd-c2c8-4d45-b8e4-e725cf7a691c&width=672&cache=v2)
- 然后我们访问上述中添加的本地ip地址,就能看到我们伪造的钓鱼网页了:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F043d7c10-5cb9-4dc9-912b-1451ae35c86a%2FUntitled.png?table=block&id=85af9103-cbfb-4655-8cd0-80d3b2384649&t=85af9103-cbfb-4655-8cd0-80d3b2384649&width=672&cache=v2)
- 然后输入用户密码,然后在终端就可以看见了
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Faabc208d-900c-4a5f-a843-788f9096e0a5%2FUntitled.png?table=block&id=8ac0de48-a3e4-48a9-ab55-8f28c085295c&t=8ac0de48-a3e4-48a9-ab55-8f28c085295c&width=624&cache=v2)
2.克隆登录网页实现钓鱼盗号
用社会工程攻击模块
- 选择网页模块攻击
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F720fc06b-7af0-4e74-962b-391ec416dbe0%2FUntitled.png?table=block&id=f64b98d8-44f8-434e-827b-a3bc6021a651&t=f64b98d8-44f8-434e-827b-a3bc6021a651&width=624&cache=v2)
- 选择钓鱼网站攻击
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F1bf37be1-d255-4ad7-b049-7eaa61de1ffe%2FUntitled.png?table=block&id=ef941319-3a0e-4b20-bf22-4193d878d819&t=ef941319-3a0e-4b20-bf22-4193d878d819&width=624&cache=v2)
- 选择网站克隆
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F291fa16a-a480-4717-b014-50419318d3f2%2FUntitled.png?table=block&id=1e9db860-80e5-4037-a9d1-4d5464d1047b&t=1e9db860-80e5-4037-a9d1-4d5464d1047b&width=624&cache=v2)
- 输入要克隆登录的地址
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbe061487-5a45-41af-95e2-4619a8171e91%2FUntitled.png?table=block&id=64cb48d7-e21c-41a6-aa5f-bbfe0010e922&t=64cb48d7-e21c-41a6-aa5f-bbfe0010e922&width=624&cache=v2)
警告:此处我使用的是一个第三方的图床软件的登录页,这个图床的运营时间超过了四年,在图传服务平台算是生命周期非常长的了
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F9f60f9ef-0639-4dd5-943c-56f1bb72e6e7%2FUntitled.png?table=block&id=83e035c5-01e6-4235-84b5-05930e272087&t=83e035c5-01e6-4235-84b5-05930e272087&width=576&cache=v2)
最终成功将用户名和密码捕获:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F2cd1648e-f6c2-42b2-a327-b4df7eb0e36d%2FUntitled.png?table=block&id=d5041972-61d3-4df1-b13f-ff00e04f28e2&t=d5041972-61d3-4df1-b13f-ff00e04f28e2&width=576&cache=v2)
随后,我尝试伪造校园网的登录页,检验是否可以成功钓鱼:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F162988db-4556-4c2d-ab43-8e0096fae2b8%2FUntitled.png?table=block&id=8eff4621-560c-41d4-af2d-39f19744754b&t=8eff4621-560c-41d4-af2d-39f19744754b&width=624&cache=v2)
查看返回结果,发现返回的密码应该使用了某种方式加密了,并且查看字段,可以发现验证码等字段是没有返回值的,并且网站返回给了一个Param的值,我初步推测是根据用户输入的这些字段转化得到的验证值,从而有效保证用户不被这种钓鱼网站窃取账号密码:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5367f7a4-824b-4d0e-bb48-fb2bf2a43cdb%2FUntitled.png?table=block&id=8644208f-e95e-42ff-8c33-28a1bddf6672&t=8644208f-e95e-42ff-8c33-28a1bddf6672&width=624&cache=v2)
从上面的两种情况,我们能看到,如果网站的后端对用户的密码等敏感字段不进行任何加密手段处理或者验证防范的话,攻击者能够轻易得到用户的个人账户信息!
3.生成URL二维码
用社会工程攻击模块
- QRCode生成器攻击向量
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbf4f9af3-7495-47bf-b15f-07901bc64bb6%2FUntitled.png?table=block&id=cf6d6e74-7282-496d-ad10-b24f92d82214&t=cf6d6e74-7282-496d-ad10-b24f92d82214&width=624&cache=v2)
- 然后输入URL地址
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F2ae9d350-caf0-4ecb-910d-18e9213fbb0e%2FUntitled.png?table=block&id=87b49c49-a6ff-420a-a445-602ad3b8ec34&t=87b49c49-a6ff-420a-a445-602ad3b8ec34&width=624&cache=v2)
- 他就会访到这个目录里面
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fc074549f-266d-4335-8ed0-e432c8f9811c%2FUntitled.png?table=block&id=592acf9d-d30c-45c1-a303-1fbc36b8fcee&t=592acf9d-d30c-45c1-a303-1fbc36b8fcee&width=624&cache=v2)
- 我们进入到该目录下找到生成的对应的二维码图片:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fa7df71c7-191c-417b-bdd8-f77b533e07d7%2Fqrcode_attack.png?table=block&id=ef1d8dbe-b978-4101-861f-1f617c6a85cf&t=ef1d8dbe-b978-4101-861f-1f617c6a85cf&width=288&cache=v2)
🧿实验总结
- 网络安全威胁的现实性:通过实现网络钓鱼的过程,网络攻击者可以利用各种方式窃取我们的敏感信息。这使我们更加意识到网络安全威胁的现实性,以及我们需要采取措施来保护自己。
- 用户行为的重要性:网络钓鱼攻击依赖于用户的行为,例如点击恶意链接或输入敏感信息。因此,我们需要更加谨慎和警惕,不要轻易相信来自不明来源的信息。
- 钓鱼攻击的多样性:setoolkit可以帮助我们实现各种类型的钓鱼攻击,包括基于网站、邮件、社交媒体等的攻击。这使我们更加了解钓鱼攻击的多样性和复杂性,在应对这些攻击时需要使用多种安全方案。
- 网页安全加密的必要性:通过我们的实验操作,我们能够清楚感受到,如果某个网页没有对用户的敏感信息进行一定程度的加密或者验证手段的设置,攻击者能够轻而易举就能获得被钓者的信息,因此在部署网站时一定要考虑对于信息加密的防御手段
🔍参考资料
- 作者:百川🌊
- 链接:https://www.baichuanweb.cn/article/example-48
- 声明:本文采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。