I am looking for a professional to craft a deceptive phishing email that targets famous people for school.
Ideal Skills and Experience:
- Proficiency in crafting phishing emails
- Experience in targeting specific personas
- Creativity in making the email engaging
- Awareness of ethical considerations in this type of project
Project 1: Craft a Phishing Email
Description: Phishing emails are increasingly more accurate and deceptive. In this project, you will do your own research to craft your own.
Research what makes a “good” phishing email. Specifically how to manipulate sender information, what subjects are best to use, what type of language is effective, etc
Choose your favorite celebrity and write them a phishing email (consider their interests or things that would concern them.)
Decide if you would use an attachment or a URL (what would you name them).
Complete the following
<Sender Email>
<Subject>
Dear (Name),
Email body that would make the recipient click the attachment or a URL (choose one) and list within your email.
Why did you choose this approach?
Project 2: Using a secure email feature
Description: Basic email lacks many privacy features. However, settings are available that allow users to encrypt and control emails. In this project, you will configure Google Gmail to send and open confidential emails.
Launch your Gmail email account.
Click Compose to open the New Message screen to create a new email message.
In the To field enter the address of someone who also has a Gmail account.
In the row of icons at the bottom of the New Message screen, click the icon that represents Turn confidential mode on/off (you can hover your mouse over the icons to display their functions).
The Confidential mode dialog box will open. Click learn more and read about sending and opening confidential emails.
Return to the Confidential mode dialog box.
Under Set expiration, click the down arrow and change the expiration to expires in 1 day.
Under require Passcode, click SMS passcode.
Click Save.
Note at the bottom of the New Message screen it tells when the email content will expire and that recipients cannot forward, copy, print, or download this email message.
Compose a brief message and click Send.
The Confirm phone numbers dialog box appears. This is required for the recipient of the email to receive a passcode through a text message. Enter the phone number of the email recipient and click Send.
The recipient of the email message will receive a text message with a passcode, which is used to open the email message that you sent.
The options to copy, paste, download, print, and forward the email message text will be disabled. The recipient can view the message and attachments until the expiration date or until the sender removes access.
How valuable is this feature?
Is it easy to use?
What are its limitations?
Close all windows.
Project 3: Using a Wireless Monitor tool
Description: Most Wi-Fi users are surprised to see how far their wireless signal will reach, and if the network is unprotected, a long reach makes it easy for an attacker hiding several hundred feet away to break into the network. Several tools can show the different wireless signals that can be detected from Wi-Fi networks. In this project, you download and install the NirSoft WifiInfoView tool. You will need a computer with a wireless adapter, such as a laptop, to complete this project.
Use your web browser to go to [login to view URL] (If you are no longer able to access the site through the web address, use a search engine to search for “NirSoft WifiInfoView.”)
Scroll down and click download WifiInfoView.
Download the tool and when finished, extract the files and then launch the program.
Wait until WiFiInfoView displays all Wi-Fi networks that it detects.
Scan through the information that is displayed. Does the amount of available information from Wi-Fi networks to which you are not connected surprise you?
Scroll back to the first column of information.
Under SSID, is there a service set identifier for each network?
Why would an SSID not appear?
Does disabling the broadcast of the SSID name give any enhanced level of security?
Why or why not?
Note the value under the column MAC Address.
How could a threat actor use this information?
Under RSSI, the signal strength is displayed. (Lower numbers indicate a stronger signal.)
The Frequency column displays the frequency on which the network is transmitting, and the Channel column gives the corresponding channel. Click Channel to sort the channels.
Is there any channel overlap?
How could this be a problem?
Double-click the Wi-Fi network to which you are currently connected. A window is displayed showing the available information that is being transmitted through the Wi-Fi. This is information regarding your Wi-Fi network that anyone can see. Close this window.
Now select a network other than the one to which you are connected and double-click it to display information. After reading the information, close the window.
Scroll to the Security and Cipher columns.
What security are the networks using?
Scroll to WPS Support.
How many networks have WPS turned on? Is this secure?
What additional information do you find useful? What information would a threat actor find useful?
Close all windows.
Project 4: Viewing WLAN security information with Vistumbler
Description: Vistumbler can be used to display the security information that is beaconed out from WLANs. Note that Vistumbler does not allow you to “crack” any WLANs but instead only displays information. In this project, you use Vistumbler to view this information. This project works best when you are in an area in which you can pick up multiple WLAN signals.
Use your web browser to go to www.vistumbler.net. (The location of content on the Internet may change without warning. If you are no longer able to access the program through this URL, use a search engine and search for “Vistumbler.”)
Click exe Installer (Mirror).
Follow the prompts to download and install Vistumbler using the default settings.
If the program does not start after the installation is complete, launch Vistumbler.
Caution Some AV software may indicate that Vistumbler is a virus. It might be necessary to temporarily turn off your AV software for this project. Be sure to turn AV back on when the project is completed.
If necessary, expand the window to full screen.
Click Scan APs. If no networks appear, click Interface and then select the appropriate wireless NIC interface.
Note the columns Signal and High Signal. How could they be used in a site survey?
Click Graph 1.
Click one of the APs displayed at the bottom of the screen. Allow Vistumbler to accumulate data over several minutes. What information is displayed on this graph?
Click Graph 2.
Click another one of the APs displayed at the bottom of the screen. Allow Vistumbler to accumulate data over several minutes. What information is displayed on this graph? How is this different from the previous graph?
Unselect the graph to return to the previous screen.
Use the horizontal scroll bar to move to the right. Note the columns Authentication, encryption, Manufacturer, and radio Type. How would this information be useful to an attacker?
Use the horizontal scroll bar to move back to the far left.
In the left pane, expand the information under Authentication. What types are listed?
Expand the information under these types and note the information given for the wireless LAN signals.
In the left pane, expand the information under encryption. What types are listed? Which types are most secure? Which types are least secure?
Expand the information under these types and note the information given for each WLAN.
Record the total number of different WLANs that you can detect, along with the number of encryption types. Which type is most common?
One of the features of Vistumbler is its ability to use audio and text-to-speech information so that the location and strength of WLANs can be detected without the need to constantly monitor the screen. Be sure that the speakers on the laptop computer are turned on.
Click Options.
Click Speak Signals. Vistumbler will “speak” the percentage of signal strength.
Quickly turn this feature off as it is annoying ?
Close Vistumbler.
Close all windows and do not save any data. If necessary, restart your AV software.
How does Vistumbler compare with WiFiInfoView?
Which is easier to use?
Which tool gives more information?
Hi There Jonathan A.,
Good morning!
My name is Jane a professional writer and a designer with skills including Excel, PDF, Data Processing and Data Entry with over 5 years. I have extensive experience in the following areas;
- Editing and proofreading
- Graphic design
- PDFs
- Word fillable forms
- Customized PowerPoints templates
- Keynote templates
- OCR
- Latex
- Adobe InDesign
Therefore, I am confident in my ability to deliver high-quality results for this project.
I am eager to discuss further details and see how I can contribute on your project. I am happy to offer a free consultation and a 10% discount for first-time clients.
Please contact me to discuss more regarding this project.
Best
Jane
Do you need a perfect and professional virtual assistance for data entry . You have come to the right effective services . I have experience of 3 years . I do data entry , data clean , data entry on MS Excel , data analysis , typing and real estate research and data entry ( name , email, phone number , address etc. )
Hi
I have read the requirements and understand them.
I can assure you that if you work with me once, you will always work with me on these kinds of projects.
would you like to discuss the project with me?
As a data entry expert proficient in Excel and PDF, I possess a wealth of experience and skills essential for efficient data management. With a meticulous eye for detail, I excel in accurately entering and organizing data into spreadsheets and PDF documents. My expertise extends to:
1. **Data Entry Accuracy:** Ensuring precise input of information, including text, numerical data, and formatting, to maintain data integrity and consistency.
3. **PDF Handling:** Experienced in converting, extracting, and organizing data from PDF files, ensuring seamless integration into Excel or other systems.
4. **Data Cleansing:** Identifying and rectifying errors, inconsistencies, and duplicates within datasets to enhance data quality and reliability.
5. **Time Efficiency:** Demonstrating the ability to work efficiently under tight deadlines while maintaining high levels of accuracy and attention to detail.
6. **Communication and Collaboration:** Effectively communicating with team members and stakeholders to understand project requirements and deliver results that meet or exceed expectations.
7. **Continuous Improvement:** Proactively seeking opportunities to streamline processes, enhance productivity, and optimize data management workflows.
With a commitment to delivering high-quality results and a passion for leveraging technology to streamline processes, I am well-equipped to handle diverse data entry tasks with precision and efficiency.