1. EachPod

Red Team Phishing Simulations: Using Evilginx2 and GoPhish

Author
HackerNoon
Published
Wed 01 May 2024
Episode Link
https://share.transistor.fm/s/21baf8e8

This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.

I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.

Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.




This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page,
and for more stories, please visit hackernoon.com.





I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.

Share to: