6 min.

Red Team Phishing Simulations: Using Evilginx2 and GoPhish Cybersecurity Tech Brief By HackerNoon

    • Technologie

This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.


This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page,
and for more stories, please visit hackernoon.com.



I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.

This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.


This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page,
and for more stories, please visit hackernoon.com.



I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.

6 min.

Top-podcasts in Technologie

✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
de Groene Nerds
Aljo Hartgers & Danny Oosterveer // De Podcasters
Acquired
Ben Gilbert and David Rosenthal
De Technoloog | BNR
BNR Nieuwsradio
Lex Fridman Podcast
Lex Fridman
Tweakers Podcast
Tweakers