Fique off-line com o app Player FM !
Red Team Phishing Simulations: Using Evilginx2 and GoPhish
Manage episode 415731885 series 3474671
This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.
This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page, and for more stories, please visit hackernoon.com.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.
121 episódios
Manage episode 415731885 series 3474671
This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.
This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page, and for more stories, please visit hackernoon.com.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.
121 episódios
Todos os episódios
×Bem vindo ao Player FM!
O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.