Time
1 hour 1 minute
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Hey, everyone, welcome back to the course. So in the last video, we wrapped up our lecture discussion on social engineering.
00:07
In this video, we're gonna go ahead into our first lap. So in this lab, we're gonna take a look at a fake social media profile. But what we're gonna do is we're gonna answer some questions as we come. Pickler Profile.
00:17
Now, in the next video, we're gonna use a fake profile that I've created sort of in the real world, but in for this particular lab when he was a cyber lab environment. Now, if you don't have access access to that, you just want to go ahead and use like your own social media profiles and on different platforms. And it's kind of look for what kind of information you're putting out there yourself.
00:36
The whole purpose behind this particular labs used to show you what kind of information people are sharing out there. And so that way you could be a little more security conscious on your own.
00:46
So let's go ahead and get started. So we're to go to the cyber, a catalogue here now you should already be loved into the cyber re site and we're either going to search certified ethical hacker where you can just type in C E. H. So either one will get you to the correct location. We're gonna choose this option here, this certified ethical hackers C E H in parentheses
01:03
and then the practice laps. So just go ahead and click on that.
01:06
You're gonna see a launch button right there. Just click on that as well. And then we have one more click and that'll take us to the lab. So you see the launch item button here. Just go ahead and click on that one. You'll see it'll open the lab environment in a separate tap.
01:19
So now, once that opens up here, you'll see a whole bunch of different labs. We're gonna be scrolling down and looking for the Social Engineering Reconnaissance Lab. So it's little down the page here.
01:30
So right here this social engineering reconnaissance, you'll notice that mind says complete, obviously, because I've already gone through it before. But yours should just show social engineering reconnaissance. So once you find that, just go ahead and click on it
01:44
and they click the start button right there.
01:46
You'll notice that will pull up the virtual machines for us here. We actually have to Booth ease up, though. So the way we do that is we discover our mouths over top here and click the power on option.
01:56
And I was gonna take a few minutes as we click of the power on here. It's gonna take a few minutes for these to boot up. So I'm gonna go ahead and pause a video here and once might have come all the way up. Then we'll go ahead and restart. They keep going in the lab.
02:08
All right, So as you can see in the background there, all of my virtual machines air now on. So they show the green coloring there and they all say on
02:15
So let's go back to our lab document here. So we're now it's step for we're going to select the Windows 10 machines. So this P lab win 10.
02:23
So it's going to click on that one there. Now, it's gonna take a few seconds here, so to kind of initialize and establish a connection for us. And sometimes you might see a command prompt window kind of splash in the background and then go away. We'll give that just a second there.
02:36
Once it pulls all the way up here, we're gonna open Internet Explorer from the bottom taskbar. There's already use Internet Explorer for this one. You could potentially use edge, but the actual instructions with this lab called for Internet Explorer. So that's what we're gonna use. Justo Maintain consistency
02:53
once we open up Internet Explorer and type in this address right here
02:58
and then we'll see are basically that's an address for our target, Philip Nomad.
03:01
So let's go and do that now. So just go and watch Internet Explorer there.
03:07
We're type http Colon Ford's last Ford Slash And then it's gonna be the might book.
03:13
You'll see my book right there.
03:15
Now, we're not actually going out to like some real social media website here. I just want to stress that s if you're in a particular jurisdiction, that it's illegal to you do something like that.
03:25
Obviously, I'm not an attorney, but this problem wouldn't count because you're in a practice lap type of environment, so you should be okay there.
03:32
All right, so we see Philip Nomad in the background here. So now the rest of this lab is basically gonna be going through clicking throughout his profile here in answering some questions.
03:43
So again, I mentioned the whole purpose here to see what kind information people are sharing out there. And you've probably seen that quite a bit. If your security conscious is all, you've probably seen that quite a bit with the amount of information people will are willing to share on social media,
03:55
and it really doesn't take that much to get people to share, you know, things like their phone number address. You know, it's pretty crazy how much people are willing to share these days.
04:04
All right, so now we see our target, Philip Nomad. As I mentioned, we're gonna start answering a few questions here, as I mentioned already. So number one question here we're gonna answer is how many followers does he have?
04:14
Question number two. Does he post pretty frequently and then question number three Is Philip married? And then we're gonna go through some other areas of his profile as well. So let's start off with how many followers does he have?
04:25
So if we look right here, we could see that almost immediately. So we see he's got 1325 people following him. So we're able to answer a question number one there.
04:33
So 1325 would go right there. All right, so does he post frequently? So by frequently, I would say, You know, at least, you know, once a day or every couple of days. You know, we just don't want to see him posting, like, once a month, Right? That doesn't really benefit us for 12 years.
04:48
So let's just take a look at this post here. We see it. Looks like he publish something about 15 minutes ago.
04:55
We keep scrolling down here on his page.
04:58
We see posted yesterday. Okay.
05:00
You know, if we keep scrolling down, we'll see that there's another post from yesterday. So it does look like he posts pretty frequently. You know, maybe not every 15 minutes, but he does post, you know, looks like at least once or twice a day.
05:12
So that answers Question number two. So no question. Number three is he married?
05:16
Well, so we see this lady here, So you know who's this, right? Who is this person? Just kind of hanging out in the background there.
05:24
So if we scroll up a little bit too, this initial post of hiss, we see that he's got a post here saying, Hey, I can't believe I've been married to my beautiful wife Nina for two years now. So hey, it looks like he's married, right?
05:34
All this information is beneficial that then we've gathered so far. Number one, the number of people following him like Is he an influencer? That's kind of what we're wondering with that, you know? So, for example, if he's an executive at Microsoft, he should have quite a few followers, right? If he's doing like Tex talks and stuff like that. So that kind of gives us an idea of like how important this person actually is for a company.
05:55
And this is really beneficial for just looking at the company itself. And then we're trying to figure out potential targets
05:59
from there.
06:00
We also see that he's married, right? So we could potentially use his wife's profile, you know, and figure out some phone numbers for her and then from there, maybe figure out his phone number and sent him random text pretending to be her. Hey, can you do this or that. Maybe, you know, can you pick up this from the store and just try to, you know, do different things like that?
06:17
And then, of course, we see that he posts pretty frequently. So if we were able to, you know, hijack his account here, we could post different things if we were focused on, like, brand damage. For example, if we were targeting Philip himself and were like, Hey, you know, if we were a criminal attacker were targeting Philip himself to try to get him fired or something like that, maybe were hired by his competitors company.
06:35
And so what we could do is we could come take over social media
06:39
start, you know, posting, you know, terrible things. And so people, you know, So that affects his brand that gets him fired at his job or something like that. So I definitely don't do that. Hope everyone watching this is ethical. But that is one potential thing that somebody could do. If you're sharing a lot information on social media,
06:57
I'm gonna pause a video here. We're gonna pick things back up in the next video as we continue looking that Phillips profile and trying to find more information about him

Up Next

Social Engineering

We will explore some fake social media profiles, craft our very own phishing email and malicious payload using the Social Engineering Toolkit (SET) in Kali Linux, and play the “victim” by opening the malicious file.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor