Website Spoofing: Using Setoolkit

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search

Summary

Website Spoffing is when a legitimate website is replicated to trick user into thinking it’s the real one. When they then enter for example their username and password or other sensitive information, the hacker obtains this information and can use it in their favor.


URL Spoofing

A website’s URL gets altered, typically in a way that the user doesn’t immediately notice. There are several common methods for this:


Homograph Attack or IDN (Internationalized Domain Name)

For this method visually similar characters from different scripts (e.g. Latin or Cyrillic) are used so that the fake URL looks similar to a real URL.


Example:

Real Website with latin a: https://www.amazon.at

Fake Website with cyrillic a: https://www.аmazon.at


Typosquatting

This method involves using common misspellings of legitimate websites which aren´t easily recognisable.


Example:

Real Website with 2 o´s: https://www.google.com

Real Website with 3 o´s: https://www.gooogle.com


Another way is to change the domain endings to a wrong version.


Usage

For replicating a website and creating a fake one you can use the tool SET (The Social Engineering Toolkit). "It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering." [1]


Step 1

Install

sudo apt install set


Step 2

Start setools:

sudo setoolkit

This is how the interface looks like:

Setoolkit1.png


Step 3

Select the right options - in this case we select the appropriate option for website spoofing and for obtaining credential data.

Setoolkit2.png

Setoolkit3 old.png

Setoolkit4.png

Setoolkit5.png


Step 4

Set the parameters: ip address and the url (for example to the login website you want to spoof) Set the ip address to use the same network your computer also is in, so you can access the website outside of the virtual machine. (But the proposed ip address would also work - for this just press enter)

Setoolkit6.png


Step 5

Accessing the fake website. When entering the ip address in your browser the fake website will appear.

Setoolkit7.png


Step 6

Now you will be able to see the data that got entered in the fake website.

Setoolkit8.png


Another example where this works would be Spotify:

Setoolkit9.png


References