Skip to content

BecomingCyber/social-engineering-attack-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Social Engineering Attack Lab (SET Toolkit)

Cybersecurity
Focus
Tool
Level


πŸ‘©πŸ½β€πŸ’» Author

Mozella L. McCoy-Flowers
Cybersecurity & Digital Forensics


🎯 Objective

This lab demonstrates how social engineering attacks are executed using the Social Engineering Toolkit (SET) and how defenders can identify and prevent credential harvesting attacks.


πŸ“Έ Lab Preview

Phishing Page


🧠 What is Social Engineering?

Social engineering is the use of psychological manipulation to trick users into revealing sensitive information.

Why It Works

  • Trust
  • Urgency
  • Authority
  • Human error

πŸš€ Lab Walkthrough

πŸ”§ Step 1: Stop Apache Server

service apache2 stop

Apache Stop Output


🎣 Step 2: Launch SET Toolkit

setoolkit

SET Menu


🧠 Step 3: Navigate Attack Options

In SET, select:

  1. Social-Engineering Attacks
  2. Website Attack Vectors
  3. Credential Harvester Attack Method

Credential Harvester


🌐 Step 4: Select Web Template

Choose the desired website template (for example, Google or Facebook) from the SET menu.

Web Templates


🌍 Step 5: Get IP Address

ifconfig eth0

Use the IP address shown for eth0 as the listener/redirect IP in SET.

IP Address
IP Entered


🎯 Step 6: Launch Phishing Page

Confirm your selections in SET and start the attack to clone and host the phishing page.

Template Selection
Cloning Output
Phishing Page


πŸ§ͺ Step 7: Simulate Victim

On a client/victim machine, browse to:

http://<your-ip>

Enter test credentials into the fake login page.

Credentials Entered
Google Redirect


πŸ”‘ Step 8: Capture Credentials

Review the SET console output or log files to view captured credentials.

Credentials Captured


🚨 Indicators of Compromise (IoCs)

  • Fake or unusual login pages
  • Suspicious or lookalike domains
  • Unexpected prompts for credentials or MFA codes

πŸ›‘οΈ Defensive Strategies

Technical controls

  • SPF, DKIM, and DMARC on email domains
  • Email filtering and sandboxing
  • Endpoint Detection and Response (EDR)
  • Web proxy and URL filtering

Human-focused controls

  • Security awareness training
  • Regular phishing simulations
  • Clear reporting channels for suspicious emails

🧠 MITRE ATT&CK Mapping

  • T1566 – Phishing
  • Credential Access techniques
  • Data Collection techniques

πŸ“š Skills Demonstrated

  • Social engineering analysis
  • Linux command-line usage
  • Threat detection mindset
  • Cybersecurity documentation

⚠️ Disclaimer

This lab is for educational purposes only.
All activities were conducted in a controlled lab environment.


πŸ“Έ Screenshots

πŸ–₯️ Terminal Setup

Terminal Open
New Terminal


πŸ”§ Apache Server

Apache Stop Output


🧰 SET Toolkit Launch

SET Menu


🧠 Social Engineering Options

Social Engineering Option
Website Attack Vector


🎣 Credential Harvester Setup

Credential Harvester
Web Templates


🌍 Network Configuration

IP Address
IP Entered


🌐 Phishing Page Deployment

Template Selection
Cloning Output
Phishing Page


πŸ§ͺ Victim Simulation

Credentials Entered
Google Redirect


πŸ”‘ Captured Credentials

Credentials Captured


βœ… Final Output

Complete


πŸ‘€ Preview in VS Code

In VS Code (or many Markdown editors), you can preview this README with:

Ctrl + Shift + V

(Use Cmd + Shift + V on macOS.)

About

Phishing and social engineering lab using the Social Engineering Toolkit (SET) with attacker lifecycle, blue-team defenses, and full documentation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors