Red Team Phishing Simulations: Using Evilginx2 and GoPhish
2024-4-30 21:31:20 Author: hackernoon.com(查看原文) 阅读量:3 收藏

Hackernoon logo

paint-brush

Red Team Phishing Simulations: Using Evilginx2 and GoPhish by@matejsmycka

Read on Terminal Reader

Read this story w/o Javascript

Open TLDRtldt arrow

Too Long; Didn't Read

I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.

featured image - Red Team Phishing Simulations: Using Evilginx2 and GoPhish

Matěj Smyčka HackerNoon profile picture

Matěj Smyčka

Matěj Smyčka

@matejsmycka

-

0-item

1-item

STORY’S CREDIBILITY

Original Reporting

Original Reporting

This story contains new, firsthand information uncovered by the writer.

Code License

Code License

The code in this story is for educational purposes. The readers are solely responsible for whatever they build with it.

L O A D I N G
. . . comments & more!


About Author

Matěj Smyčka HackerNoon profile picture

TOPICS

THIS ARTICLE WAS FEATURED IN...

RELATED STORIES


文章来源: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish?source=rss
如有侵权请联系:admin#unsafe.sh