Phishing Demonstration and Simulation Using a Virtual Machine
Phishing can be understood more clearly through practical demonstration.
In this part, we walk through a step-by-step simulation of a phishing attack using a virtual machine environment. This example shows how attackers create a fake login page, deliver a phishing message, and collect stolen credentials. The goal is to increase awareness—not to promote illegal activity.
For the simulation, we use:
-
Kali Linux (attacker VM)
-
Windows 10 (victim VM)
-
Social Engineering Toolkit (SET)
SET is a legitimate penetration testing tool used by cybersecurity professionals to simulate social engineering attacks.
1. Tools and Setup
Attack Machine: Kali Linux
-
Installed on VirtualBox or VMware
-
SET Toolkit pre-installed
-
Internet connection enabled
Victim Machine: Windows 10
-
Browser: Chrome/Edge
-
Email client installed
-
Normal user privileges
The attacker and victim VMs are connected to the same virtual NAT network.
2. Launching the Social Engineering Toolkit (SET)
SET opens with multiple attack categories.
Choose the following path:
-
Social-Engineering Attacks
-
Website Attack Vectors
-
Credential Harvester Attack Method
-
Site Cloner
SET then asks for:
-
The URL of the site to clone
(Example: https://accounts.google.com)
SET will clone the site and host the fake login page locally.
3. Hosting the Fake Login Page
SET provides an IP, for example:
This IP is the phishing page URL that victims will be tricked into clicking.
The cloned website looks identical to the real Google login page.
4. Sending the Phishing Email
A phishing email is crafted containing:
-
Fake security alert
-
Urgent language
-
A malicious link to the cloned page
(http://192.168.1.15/login)
Example message:
“Your Google account has been suspended.
Click the link below to verify your identity.”
Attackers often spoof email addresses to make messages appear legitimate.
5. Victim Interaction on Windows VM
On the Windows VM:
-
Victim receives the phishing email.
-
Victim clicks the link.
-
Browser opens the cloned login page (identical to Google).
-
Victim enters username and password.
-
SET immediately captures the credentials.
On the attacker screen, credentials appear in real time:
6. Understanding the Attack Mechanism
What happens technically:
-
The cloned page uses HTML/CSS identical to Google
-
Form input fields send data to the attacker server using POST requests
-
The fake site does NOT log the user in
-
Attackers can immediately use the stolen credentials
-
No advanced hacking or password cracking needed—humans are the weakness
This is why phishing remains so successful.
7. Optional: MITM Phishing (Advanced Demonstration)
Using Evilginx2, attackers can:
-
Capture session cookies
-
Bypass 2-factor authentication (SMS codes, app-based codes)
-
Log in without the victim knowing
This is known as man-in-the-middle phishing, commonly used in high-level attacks.
8. Ethical Considerations
This simulation is performed in a controlled environment for educational purposes only.
Conducting phishing attacks outside a test environment is illegal.
The purpose of this demonstration is:
-
Increasing awareness
-
Showing real attacker techniques
-
Helping users identify phishing attempts
-
Training cybersecurity best practices




Comments
Post a Comment