Eccu 501 Module 2 Assignment Lab - 2
Eccu 501 Module 2 Assignment Lab - 2
Lab Assignments
EC-Council University
14/07/2024
1
2
SUNIL KUMAR GOLEY TAMANG
Task 2) Gathering information about a Target website using Central
OPS
3) A search result for the given target showing Address lookup, Domain whois record, as shown in the
screenshot
4
SUNIL KUMAR GOLEY TAMANG
5
SUNIL KUMAR GOLEY TAMANG
An Attacker can get information about network and domain through this information gathering tool.
4) Scroll down to view information such as Network Whois record and DNS record, as shown in the screenshot.
The attacker can use injection attack with this data to an organization.
6
SUNIL KUMAR GOLEY TAMANG
7
SUNIL KUMAR GOLEY TAMANG
Questions
Describe any four social engineering techniques to gather information.
I) Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They
lure users into a trap that steals their personal information or inflicts their systems with malware.
The most reviled form of baiting uses physical media to disperse malware. For example, attackers
leave the bait—typically malware-infected flash drives—in conspicuous areas where potential
victims are certain to see them (e.g., bathrooms, elevators, the parking lot of a targeted company).
The bait has an authentic look to it, such as a label presenting it as the company’s payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting in
consist of enticing ads that lead to malicious sites or that encourage users to download a malware-
infected application.
ii) Scareware
Scareware involves victims being bombarded with false alarms and fictitious threats. Users are
deceived to think their system is infected with malware, prompting them to install software that has
no real benefit (other than for the perpetrator) or is malware itself. Scareware is also referred to as
A common scareware example is the legitimate-looking popup banners appearing in your browser
while surfing the web, displaying such text such as, “Your computer may be infected with harmful
spyware programs.” It either offers to install the tool (often malware-infected) for you, or will direct
Scareware is also distributed via spam email that doles out bogus warnings, or makes offers for users
iii) Pretexting
Here an attacker obtains information through a series of cleverly crafted lies. The scam is often
critical task.
The attacker usually starts by establishing trust with their victim by impersonating co-workers,
police, bank and tax officials, or other persons who have right-to-know authority. The pretexter asks
questions that are ostensibly required to confirm the victim’s identity, through which they gather
All sorts of pertinent information and records is gathered using this scam, such as social security
numbers, personal addresses and phone numbers, phone records, staff vacation dates, bank records
iv) Phishing
9
SUNIL KUMAR GOLEY TAMANG
As one of the most popular social engineering attack types, phishing scams are email and text
message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods
them into revealing sensitive information, clicking on links to malicious websites, or opening
An example is an email sent to users of an online service that alerts them of a policy violation
requiring immediate action on their part, such as a required password change. It includes a link to an
unsuspecting user to enter their current credentials and new password. Upon form submittal the
Given that identical, or near-identical, messages are sent to all users in phishing campaigns, detecting
and blocking them are much easier for mail servers having access to threat sharing platforms.
v) Spear phishing
This is a more targeted version of the phishing scam whereby an attacker chooses specific
individuals or enterprises. They then tailor their messages based on characteristics, job positions, and
contacts belonging to their victims to make their attack less conspicuous. Spear phishing requires
much more effort on behalf of the perpetrator and may take weeks and months to pull off. They’re
much harder to detect and have better success rates if done skillfully.
consultant, sends an email to one or more employees. It’s worded and signed exactly as the
consultant normally does, thereby deceiving recipients into thinking it’s an authentic message. The
message prompts recipients to change their password and provides them with a link that redirects
them to a malicious page where the attacker now captures their credentials.
References
1) https://www.imperva.com/learn/application-security/social-engineering-attack/
10
SUNIL KUMAR GOLEY TAMANG