Faculty Mentor(s)

Bryson Payne

Campus

Dahlonega

Proposal Type

Poster

Subject Area

Computer Science

Location

Floor

Start Date

22-3-2019 11:00 AM

End Date

22-3-2019 12:00 PM

Description/Abstract

This research will analyze phishing emails and how they relate to cyber security in the modern world. Cyber security is a crucial field that businesses and large organizations as well as individuals need to keep in mind when concerning the safety and integrity of a group. The Social Engineering Toolkit from Kali Linux will be used to with the Credential Harvester Attack Method to use the Site Cloner to clone the website “facebook” to simulate an email phishing attack. This will be done on a Kali Linux and a Windows 10 virtual machine. The experiment will have a phishing email opened on the Windows 10 virtual machine and have username and password information input through the cloned facebook page. The data gathered from this on to the Kali Linux virtual machine will illustrate how dangerous these attacks can be and what kinds of measures can be taken against them to ensure that a party is not compromised.

Key words: Social engineering, phishing, emails, keyloggers, passwords, security, cyber security, social engineering toolkit, websites, computer science

Media Format

flash_audio

Share

COinS
 
Mar 22nd, 11:00 AM Mar 22nd, 12:00 PM

16. An Examination of Social Engineering Regarding Phishing Emails

Floor

This research will analyze phishing emails and how they relate to cyber security in the modern world. Cyber security is a crucial field that businesses and large organizations as well as individuals need to keep in mind when concerning the safety and integrity of a group. The Social Engineering Toolkit from Kali Linux will be used to with the Credential Harvester Attack Method to use the Site Cloner to clone the website “facebook” to simulate an email phishing attack. This will be done on a Kali Linux and a Windows 10 virtual machine. The experiment will have a phishing email opened on the Windows 10 virtual machine and have username and password information input through the cloned facebook page. The data gathered from this on to the Kali Linux virtual machine will illustrate how dangerous these attacks can be and what kinds of measures can be taken against them to ensure that a party is not compromised.

Key words: Social engineering, phishing, emails, keyloggers, passwords, security, cyber security, social engineering toolkit, websites, computer science

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.