Phish like a Phisher, Defend like a Guardian, Part 2.
I hope you enjoyed my previous article, ‘Phish Like a Phisher, Defend Like a Guardian.’ While we’re still on that topic, we’re diving into something different today.
I used this technique when I was 17 years old to hack my dad’s Facebook account by tricking him into clicking a link and submitting his username and password. I don’t know much about hacking then, but I do know various tricks to access internet browsing for free.
My brother was my mentor in this area because we both loved to play games.
We started with Java and Symbian mobile phones, like the Nokia 3110c, which had a screen size of 128 x 160.
Today, I will walk you through how to use a platform-based phishing website to develop security awareness in your organization, home, and community. The platform I used to hack my dad’s Facebook is no longer available (shadow.za), and I can’t quite remember the website name, but I believe it’s been taken down. If you know the website, feel free to comment this is all part of our learning process.
Disclaimer: This is for educational purposes only. We strongly encourage you to use the techniques and knowledge shared here only with proper authorization from the appropriate parties. Engaging in hacking without permission is both unethical and illegal.
What do i need to phish like a phisher:
- Internet connectivity
- Laptop/Mobile
- Open mind
Let’s get started:
We have different open source application to carry out a social engineering awareness campaign,
All the tools mentioned above can be used to carry out phishing simulation awareness in your organization.
We also have a paid phishing simulation platform like:
Free web based phishing simulation platform, If you want to minimize cost but it is not a good practice to minimize budget on your crown jewels. Ask yourself “What is your data worth? to you!.
We’ll be using the free web platform based tools. You can also used this for your organization to test your employee security postures.
What is sc0m: is a tool designed for penetration testing and security assessments, allowing users to simulate hacking techniques in a controlled environment.
Click on the website link:
Click on create account:
Remember, the purpose of this exercise is to assess the level of security education in your business environment, home, and community
Analyst: Consider everything you’re doing now as if you were hired for these services or assigned to perform them in a workplace setting.
Before we proceed my advice for you is to use Temp Mail address for the Email section.
We have different website to create Temp Mail but i will mention two to you:
In my case i will be using the first one to create my temporary email address.
You can create multiple email addresses easily. If you don’t want to use a particular email, simply delete it, and a new one can be created instantly.
Click on Log In
To create a phishing webpage and send it via email, text message, or through WhatsAPP chat.
The links in the box are what we’ll be sending to our employees, using persuasion, trust, urgency, curiosity, and fear to trick them into submitting their credentials.
Hmm, I think the URL is too long. What can we do to shorten it?
I’ve got you covered, just click on this link
Copy the link and send it out via email to various departments in your organization, as well as to family and friends in your community.
In my case, I will send it to my younger brother via WhatsApp
I will wait for him to click on the link, and I can monitor if he does so through my URL shortening dashboard.
What do you think? Never trust your CEO, Confirm before you react to anything.
Let’s check our sc0m dashboard if anything comes up.
Let’s wait for my brother screen response on this.
That’s cool.
Let’s check his password.
Click on “Get infor User”
CLAP FOR YOURSELF!!!!
This is how you’ll compromise all employee credentials by leveraging intuition and penetrating their minds with urgency, fear, trust, and curiosity.
Takeways:
- Don’t just click
- Verify the source
“What do you think about my writing style?”
This is how you can carry out phishing activities in your organizaiton, home and communities.
What else;
In my next post i will teach you to “Defend like a Guardian”.
Cybersecurity is Intention
Don’t forget it’s your gUy — Abdul Basit Rotimi
follow me for more cybersecurity contents.