Phishing Attack on Credential Harvester (Google)
الملخص
Abstract—Vulnerabilities and weaknesses of web applications are targeting by attackers. Therefore, penetration testing techniques are very important for building strategies which make the system is secure. This paper proposes a penetration testing model for phishing attack which is a common these days. The proposed model was implemented using the latest versions of VMware-machine, kali-Linux, and Windows 10. The Hiddeneye, Ngrok, and bitly tools were used. This was achieved by information gathering method. The obtained results of the phishing attack were identified and their appropriate countermeasures were defined.