<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on%3A_Simulasi_Phishing_Attack_%28en%29</id>
	<title>Hands-on: Simulasi Phishing Attack (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on%3A_Simulasi_Phishing_Attack_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;action=history"/>
	<updated>2026-05-04T16:36:10Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;diff=71162&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;Here is an explanation and example of a '''Phishing Attack''' simulation using '''Kali Linux 2024.3''' in the context of an ethical hacking course.  ==Phishing Attack Overview...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;diff=71162&amp;oldid=prev"/>
		<updated>2024-10-28T23:51:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Here is an explanation and example of a &amp;#039;&amp;#039;&amp;#039;Phishing Attack&amp;#039;&amp;#039;&amp;#039; simulation using &amp;#039;&amp;#039;&amp;#039;Kali Linux 2024.3&amp;#039;&amp;#039;&amp;#039; in the context of an ethical hacking course.  ==Phishing Attack Overview...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Here is an explanation and example of a '''Phishing Attack''' simulation using '''Kali Linux 2024.3''' in the context of an ethical hacking course.&lt;br /&gt;
&lt;br /&gt;
==Phishing Attack Overview==&lt;br /&gt;
Phishing is a social engineering attack technique in which an attacker tricks a victim into providing sensitive information such as usernames, passwords, or credit card details through a fake website that appears legitimate. This simulation uses the '''Social Engineering Toolkit (SET)''' which is already installed on Kali Linux.&lt;br /&gt;
&lt;br /&gt;
==Hands-on Steps: Phishing Attack Simulation on Kali Linux 2024.3==&lt;br /&gt;
&lt;br /&gt;
===1. Open '''Kali Linux''' and Run Social Engineering Toolkit (SET)===&lt;br /&gt;
SET is a powerful tool for simulating social engineering-based attacks such as phishing. Run the following command to get started:&lt;br /&gt;
&lt;br /&gt;
sudo setoolkit&lt;br /&gt;
&lt;br /&gt;
The SET interface will appear with several options. Select the first option for social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
===2. Select '''Website Attack Vectors'''===&lt;br /&gt;
In the SET main menu, select option '''2''' for *Website Attack Vectors*:&lt;br /&gt;
&lt;br /&gt;
2) Website Attack Vectors&lt;br /&gt;
&lt;br /&gt;
===3. Select '''Credential Harvester Attack Method'''===&lt;br /&gt;
Next, select the '''Credential Harvester''' method:&lt;br /&gt;
&lt;br /&gt;
3) Credential Harvester Attack Method&lt;br /&gt;
&lt;br /&gt;
This method will capture the credentials (username and password) entered by the victim on the phishing site.&lt;br /&gt;
&lt;br /&gt;
===4. Select '''Site Cloner'''===&lt;br /&gt;
To create a fake site that looks like the original site, select the '''Site Cloner''' option:&lt;br /&gt;
&lt;br /&gt;
2) Site Cloner&lt;br /&gt;
&lt;br /&gt;
===5. Enter Target URL===&lt;br /&gt;
After selecting '''Site Cloner''', you are asked to enter the URL of the site you want to clone (e.g., Facebook login page, Gmail, etc.). For example, to fake the Gmail login page, type:&lt;br /&gt;
&lt;br /&gt;
https://accounts.google.com&lt;br /&gt;
&lt;br /&gt;
===6. IP Address Configuration===&lt;br /&gt;
SET will ask for the IP address of your phishing server (the computer that SET will run on). To get the IP address, run the command:&lt;br /&gt;
&lt;br /&gt;
ifconfig&lt;br /&gt;
&lt;br /&gt;
Then enter the IP address into SET when prompted.&lt;br /&gt;
&lt;br /&gt;
===7. Start Phishing Server===&lt;br /&gt;
Once all the configurations are complete, SET will start a local phishing server that can be accessed by the target. Every time the victim visits the phishing URL and enters their credentials, SET will capture the information.&lt;br /&gt;
&lt;br /&gt;
===8. Simulate Attack===&lt;br /&gt;
* Send the generated URL to the target via email, message, or other method. Make sure you have the target's permission, as this is part of ethical hacking.&lt;br /&gt;
* When the victim visits the fake site and enters their credentials, this information will be captured by SET and displayed in your Kali Linux terminal.&lt;br /&gt;
&lt;br /&gt;
===9. Capture and Display Credentials===&lt;br /&gt;
On the SET screen, you will see the results of successfully captured credentials:&lt;br /&gt;
&lt;br /&gt;
[*] WE GOT A HIT!&lt;br /&gt;
POST Data: user=exampleuser&amp;amp;pass=examplepassword&lt;br /&gt;
&lt;br /&gt;
Here, the victim's username and password have been successfully obtained from the fake login page.&lt;br /&gt;
&lt;br /&gt;
==Ethical Practices==&lt;br /&gt;
Phishing is a dangerous attack method if misused. In the context of ethical hacking, this simulation should be done with legitimate permission and only for educational or security testing purposes.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
The phishing attack simulation using '''Kali Linux 2024.3''' and '''Social Engineering Toolkit (SET)''' provides a real-world view of how this attack is carried out. It is a great way to learn the important aspects of social engineering and helps raise awareness about cybersecurity among internet users.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Ethical Hacking]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>