Faculty Mentor(s)
Bryson Payne
Campus
Dahlonega
Proposal Type
Poster
Subject Area
Computer Science
Location
Floor
Start Date
22-3-2019 11:00 AM
End Date
22-3-2019 12:00 PM
Description/Abstract
This research will analyze phishing emails and how they relate to cyber security in the modern world. Cyber security is a crucial field that businesses and large organizations as well as individuals need to keep in mind when concerning the safety and integrity of a group. The Social Engineering Toolkit from Kali Linux will be used to with the Credential Harvester Attack Method to use the Site Cloner to clone the website “facebook” to simulate an email phishing attack. This will be done on a Kali Linux and a Windows 10 virtual machine. The experiment will have a phishing email opened on the Windows 10 virtual machine and have username and password information input through the cloned facebook page. The data gathered from this on to the Kali Linux virtual machine will illustrate how dangerous these attacks can be and what kinds of measures can be taken against them to ensure that a party is not compromised.
Key words: Social engineering, phishing, emails, keyloggers, passwords, security, cyber security, social engineering toolkit, websites, computer science
Media Format
flash_audio
16. An Examination of Social Engineering Regarding Phishing Emails
Floor
This research will analyze phishing emails and how they relate to cyber security in the modern world. Cyber security is a crucial field that businesses and large organizations as well as individuals need to keep in mind when concerning the safety and integrity of a group. The Social Engineering Toolkit from Kali Linux will be used to with the Credential Harvester Attack Method to use the Site Cloner to clone the website “facebook” to simulate an email phishing attack. This will be done on a Kali Linux and a Windows 10 virtual machine. The experiment will have a phishing email opened on the Windows 10 virtual machine and have username and password information input through the cloned facebook page. The data gathered from this on to the Kali Linux virtual machine will illustrate how dangerous these attacks can be and what kinds of measures can be taken against them to ensure that a party is not compromised.
Key words: Social engineering, phishing, emails, keyloggers, passwords, security, cyber security, social engineering toolkit, websites, computer science