<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on%3A_Simulasi_Phishing_Attack_%28en%29</id>
	<title>Hands-on: Simulasi Phishing Attack (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on%3A_Simulasi_Phishing_Attack_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;action=history"/>
	<updated>2026-04-23T13:16:06Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;diff=71162&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;Here is an explanation and example of a &#039;&#039;&#039;Phishing Attack&#039;&#039;&#039; simulation using &#039;&#039;&#039;Kali Linux 2024.3&#039;&#039;&#039; in the context of an ethical hacking course.  ==Phishing Attack Overview...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on:_Simulasi_Phishing_Attack_(en)&amp;diff=71162&amp;oldid=prev"/>
		<updated>2024-10-28T23:51:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Here is an explanation and example of a &amp;#039;&amp;#039;&amp;#039;Phishing Attack&amp;#039;&amp;#039;&amp;#039; simulation using &amp;#039;&amp;#039;&amp;#039;Kali Linux 2024.3&amp;#039;&amp;#039;&amp;#039; in the context of an ethical hacking course.  ==Phishing Attack Overview...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Here is an explanation and example of a &amp;#039;&amp;#039;&amp;#039;Phishing Attack&amp;#039;&amp;#039;&amp;#039; simulation using &amp;#039;&amp;#039;&amp;#039;Kali Linux 2024.3&amp;#039;&amp;#039;&amp;#039; in the context of an ethical hacking course.&lt;br /&gt;
&lt;br /&gt;
==Phishing Attack Overview==&lt;br /&gt;
Phishing is a social engineering attack technique in which an attacker tricks a victim into providing sensitive information such as usernames, passwords, or credit card details through a fake website that appears legitimate. This simulation uses the &amp;#039;&amp;#039;&amp;#039;Social Engineering Toolkit (SET)&amp;#039;&amp;#039;&amp;#039; which is already installed on Kali Linux.&lt;br /&gt;
&lt;br /&gt;
==Hands-on Steps: Phishing Attack Simulation on Kali Linux 2024.3==&lt;br /&gt;
&lt;br /&gt;
===1. Open &amp;#039;&amp;#039;&amp;#039;Kali Linux&amp;#039;&amp;#039;&amp;#039; and Run Social Engineering Toolkit (SET)===&lt;br /&gt;
SET is a powerful tool for simulating social engineering-based attacks such as phishing. Run the following command to get started:&lt;br /&gt;
&lt;br /&gt;
sudo setoolkit&lt;br /&gt;
&lt;br /&gt;
The SET interface will appear with several options. Select the first option for social engineering attacks.&lt;br /&gt;
&lt;br /&gt;
===2. Select &amp;#039;&amp;#039;&amp;#039;Website Attack Vectors&amp;#039;&amp;#039;&amp;#039;===&lt;br /&gt;
In the SET main menu, select option &amp;#039;&amp;#039;&amp;#039;2&amp;#039;&amp;#039;&amp;#039; for *Website Attack Vectors*:&lt;br /&gt;
&lt;br /&gt;
2) Website Attack Vectors&lt;br /&gt;
&lt;br /&gt;
===3. Select &amp;#039;&amp;#039;&amp;#039;Credential Harvester Attack Method&amp;#039;&amp;#039;&amp;#039;===&lt;br /&gt;
Next, select the &amp;#039;&amp;#039;&amp;#039;Credential Harvester&amp;#039;&amp;#039;&amp;#039; method:&lt;br /&gt;
&lt;br /&gt;
3) Credential Harvester Attack Method&lt;br /&gt;
&lt;br /&gt;
This method will capture the credentials (username and password) entered by the victim on the phishing site.&lt;br /&gt;
&lt;br /&gt;
===4. Select &amp;#039;&amp;#039;&amp;#039;Site Cloner&amp;#039;&amp;#039;&amp;#039;===&lt;br /&gt;
To create a fake site that looks like the original site, select the &amp;#039;&amp;#039;&amp;#039;Site Cloner&amp;#039;&amp;#039;&amp;#039; option:&lt;br /&gt;
&lt;br /&gt;
2) Site Cloner&lt;br /&gt;
&lt;br /&gt;
===5. Enter Target URL===&lt;br /&gt;
After selecting &amp;#039;&amp;#039;&amp;#039;Site Cloner&amp;#039;&amp;#039;&amp;#039;, you are asked to enter the URL of the site you want to clone (e.g., Facebook login page, Gmail, etc.). For example, to fake the Gmail login page, type:&lt;br /&gt;
&lt;br /&gt;
https://accounts.google.com&lt;br /&gt;
&lt;br /&gt;
===6. IP Address Configuration===&lt;br /&gt;
SET will ask for the IP address of your phishing server (the computer that SET will run on). To get the IP address, run the command:&lt;br /&gt;
&lt;br /&gt;
ifconfig&lt;br /&gt;
&lt;br /&gt;
Then enter the IP address into SET when prompted.&lt;br /&gt;
&lt;br /&gt;
===7. Start Phishing Server===&lt;br /&gt;
Once all the configurations are complete, SET will start a local phishing server that can be accessed by the target. Every time the victim visits the phishing URL and enters their credentials, SET will capture the information.&lt;br /&gt;
&lt;br /&gt;
===8. Simulate Attack===&lt;br /&gt;
* Send the generated URL to the target via email, message, or other method. Make sure you have the target&amp;#039;s permission, as this is part of ethical hacking.&lt;br /&gt;
* When the victim visits the fake site and enters their credentials, this information will be captured by SET and displayed in your Kali Linux terminal.&lt;br /&gt;
&lt;br /&gt;
===9. Capture and Display Credentials===&lt;br /&gt;
On the SET screen, you will see the results of successfully captured credentials:&lt;br /&gt;
&lt;br /&gt;
[*] WE GOT A HIT!&lt;br /&gt;
POST Data: user=exampleuser&amp;amp;pass=examplepassword&lt;br /&gt;
&lt;br /&gt;
Here, the victim&amp;#039;s username and password have been successfully obtained from the fake login page.&lt;br /&gt;
&lt;br /&gt;
==Ethical Practices==&lt;br /&gt;
Phishing is a dangerous attack method if misused. In the context of ethical hacking, this simulation should be done with legitimate permission and only for educational or security testing purposes.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
The phishing attack simulation using &amp;#039;&amp;#039;&amp;#039;Kali Linux 2024.3&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;Social Engineering Toolkit (SET)&amp;#039;&amp;#039;&amp;#039; provides a real-world view of how this attack is carried out. It is a great way to learn the important aspects of social engineering and helps raise awareness about cybersecurity among internet users.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Ethical Hacking]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>