Social Media Security Analysis against Online phishing attacks using Zphisher and Social Engineering Toolkit methods


Keywords: Email Spoofing, Phishing, Zphisher, Social Engineering Toolkit, Kali Linux

Reference: Blog City and UK News and MF and 9 Naga

Abstract

This study analyzed social media security against online phishing attacks using Zphisher and Social Engineering Toolkit (SET) methods. The main purpose of the study was to identify phishing techniques used by Zphisher and SET, as well as test whether social media pages can be cloned to steal user data when logged in. In addition, the study explores the use of email spoofing as a medium for spreading phishing links. The research method includes qualitative approach through literature study and quantitative approach with experiments using Kali Linux virtual machine. The results showed that all social media platforms tested were vulnerable to phishing attacks and spoofing emails, proving the effectiveness of the methods used in cloning web pages and stealing user data. The study emphasizes the importance of raising public awareness of phishing and email spoofing threats to information security on social media.

References

Agustian Akbar, D., Rahdian, M., Kurnia, E., Handheld, R. M., Star, S., Purwoko, R., Siber, P., & Country, S. (2024). Phishing web analysis using the OSCAR Forensic method (Case Study: free Instagram followers). Journal of Information Engineering(JTINFO), 3 (1), 18-24.

Aklani, S. A., Haeruddin, & Putri, N. (2024). Implementation of MAIL GATEWAY SECURITY in improving Information Systems Batam International University abstraction Development Life Cycle (NDLC ), includes stages of analysis involving the identification of threats and gateways by utilizing Asset Services. Journal of Information System Management (JOISM), 5(2).