Get AI summaries of any video or article — Sign up free
Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2 thumbnail

Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2

NetworkChuck·
5 min read

Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Credential harvesting can be performed by deploying a fake login page that captures usernames and passwords when victims enter them.

Briefing

Phishing attacks are alarmingly easy to execute because they don’t require breaking encryption or cracking software—they rely on tricking people into entering credentials or taking actions. The walkthrough demonstrates a full chain: build a fake LinkedIn login page to harvest usernames and passwords, then send a targeted “urgent” message to get a specific person to visit the trap.

The first phase focuses on credential harvesting. Using Kali Linux, the process clones a tool called black eye and runs a script to generate a phishing site that mimics LinkedIn. After the site is launched, the attacker waits for the target to interact. When the victim attempts to log in, the fake page captures sensitive inputs and also collects additional reconnaissance such as the victim’s public IP address, browser-related information, and—critically—login credentials saved to a local file. The attacker then uses the captured details to complete the next step: getting the victim to click the link in the first place.

That second phase turns the harvested trap into a deliverable. The attacker crafts a phishing email designed to look like it comes from LinkedIn messaging, using urgency and a plausible sender name to reduce suspicion. The message is sent to a single address for maximum targeting, described as spear phishing. The transcript goes further by framing the target as a high-value executive—“whaling”—and shows how the same basic phishing mechanics can be aimed at a CEO-level person rather than random users. Once the victim clicks the link and attempts to sign in, the attacker gains the credentials and additional information again.

Beyond link-based credential theft, the walkthrough highlights alternate delivery methods that exploit the same human weaknesses. It describes “smishing” (SMS phishing) and “vishing” (voice phishing), arguing that people often defend themselves against email threats more than they do against texts or phone calls. It also introduces “farming” phishing, where DNS or local host-file manipulation forces a victim’s device to route a legitimate-looking domain (like linkedin.com) to a malicious clone—even if the victim types the real address. In that scenario, the victim may feel safer because they’re not clicking a suspicious link; the redirection happens before the browser ever reaches the real site.

The closing section shifts to defense. The most emphasized protections are practical: rely on strong spam filtering, avoid clicking or downloading links from unexpected messages, and instead navigate directly to sensitive services by typing the address or using trusted bookmarks. When links must be used, the transcript stresses verifying the sender via email headers and confirming the message originates from a reputable source. It also recommends treating phishing as a multi-channel problem—email, text, instant messaging, and phone calls all carry risk—and educating family members, especially older relatives, to avoid clicking, answering, or sharing information.

Overall, the core takeaway is that phishing works because it targets decision-making under pressure—urgency, fear, and familiarity—while the technical setup can be assembled with off-the-shelf tools. That combination makes the threat accessible, scalable, and difficult to notice until credentials are already compromised.

Cornell Notes

The walkthrough shows how phishing can be built and deployed in stages: first, a fake LinkedIn login page harvests credentials (credential harvesting). Next, a targeted “urgent” message (spear phishing, framed as whaling for a CEO-level target) is sent to persuade the victim to click and attempt login. It also highlights other channels—smishing via SMS and vishing via phone calls—where people may be less cautious than with email. Finally, it explains “farming” phishing, where DNS/host-file manipulation can redirect a real domain to a counterfeit site, reducing the victim’s ability to detect the scam. The defense emphasis is on spam filtering, avoiding links/downloads, verifying senders, and educating users to navigate to sensitive sites directly.

How does credential harvesting work in the described phishing workflow?

A phishing site is generated to look like LinkedIn, with fields for username and password. When the victim enters credentials, the fake page captures the inputs and stores them (the transcript mentions saving the stolen email/password to a text file). The setup also collects reconnaissance such as the victim’s public IP address and browser information, giving the attacker more context even before the victim submits credentials.

What’s the difference between mass phishing and spear phishing (and why it matters here)?

Mass phishing sends the same lure broadly, hoping someone clicks. Spear phishing targets a specific person by sending a tailored message—here, the message is crafted to look like LinkedIn messaging and is sent to a single address. Targeting increases credibility: urgency (“urgent message”) and a plausible sender name make the victim more likely to act.

Why does the transcript treat “whaling” as especially dangerous?

Whaling is spear phishing aimed at high-value individuals with influence and access—described as targeting the CEO of NetworkChuck Coffee. Attacking executives can yield greater impact because they often have access to sensitive systems, and their compromise can cascade through organizational trust and authority.

How do smishing and vishing expand the phishing threat beyond email?

Smishing uses SMS links to lure victims into credential entry or other actions. Vishing uses phone calls where an attacker pretends to be a trusted service (the transcript uses LinkedIn as an example) and directs the victim to log in via a provided URL. The key point is that many people are trained to distrust email links but may not apply the same caution to texts or calls.

What is “farming” phishing, and how does DNS/host-file manipulation change the victim’s experience?

Farming phishing involves redirecting a real domain (like linkedin.com) to a fake site. The transcript explains that a host file can override DNS lookups, so when the victim types the legitimate domain, the device routes it to the attacker’s IP instead of the real service. This can bypass the victim’s usual cues—because they didn’t click a suspicious link; they typed the correct address.

What defensive behaviors are emphasized to reduce phishing success?

The transcript stresses using spam filters, avoiding clicking or downloading links from unexpected messages, and instead logging into banks or sensitive services by typing the address or using trusted navigation. It also recommends verifying sender legitimacy (e.g., checking email headers in Gmail) and treating phishing as multi-channel risk across email, SMS, instant messaging, and phone calls. Education for family members—especially older users—is presented as a practical safeguard.

Review Questions

  1. What specific information can a credential-harvesting phishing page collect besides the username and password?
  2. How do spear phishing and whaling increase the likelihood of a victim acting on a phishing lure?
  3. Why might DNS/host-file manipulation make phishing harder to detect than a simple fake login link?

Key Points

  1. 1

    Credential harvesting can be performed by deploying a fake login page that captures usernames and passwords when victims enter them.

  2. 2

    Phishing becomes more effective when messages are targeted (spear phishing) and framed with urgency or familiarity.

  3. 3

    Attacks aimed at executives (“whaling”) can have outsized impact because high-value targets often hold more access and influence.

  4. 4

    Smishing and vishing shift phishing from email into SMS and phone calls, where many people apply less scrutiny.

  5. 5

    “Farming” phishing can redirect real domains to counterfeit sites using DNS or host-file overrides, reducing the victim’s ability to spot the scam.

  6. 6

    Defense starts with strong spam filtering, then avoids clicking or downloading unexpected links; for sensitive sites, navigate directly by typing the address or using trusted bookmarks.

  7. 7

    Verifying sender details (such as email headers) and educating family members can prevent credential theft even when attackers use social engineering instead of technical exploits.

Highlights

A fake LinkedIn login page can harvest credentials and also gather reconnaissance like public IP address and browser information when the victim attempts to sign in.
Targeted phishing (“spear phishing”) relies on tailoring the message—such as an “urgent” LinkedIn-style prompt—to overcome suspicion.
Smishing (SMS) and vishing (voice) exploit the fact that people often defend against email threats more than they do against texts and calls.
“Farming” phishing can work even when victims type the correct domain by redirecting traffic through DNS/host-file manipulation.
Practical defenses emphasized include spam filtering, avoiding links/downloads, verifying senders, and logging into sensitive services directly rather than via messages.

Topics

  • Phishing
  • Credential Harvesting
  • Spear Phishing
  • Smishing
  • DNS Poisoning

Mentioned

  • SMTP
  • DNS
  • SMS