CONFIGURATION

these are the three most important gophish sections that must be configured prior to operation

USERS & GROUPS (TARGETS/RECIPIENTS)

root@oco:~$ BROWSER > https://{gophishAdminPortal:3333}
 username: {arbitraryValue}
 password: {arbitraryValue}
 
GoPhish > Users & Groups > New Group
 Name: {arbitraryValue}
 First Name: {arbitraryValue}
 Last Name: {arbitraryValue}
 Email: {arbitraryValue}
 Position: {arbitraryValue}
 
 * bulk users can be imported in this section
 * gophish can be set up to send mass email to addresses that are found during OSINT

EMAIL TEMPLATES

#create a sample account from a legitimate site and use its "activation instructions"
root@oco:~$ BROWSER > https://www.onelogin.com/
 * register for an account
root@oco:~$ BROWSER > mail.google.com > OneLogin - [Instructions] Activate Your 30 Day OneLogin Trial > Show Original > Copy to Clipboard
 * retrieve the activation email by selecting the three dots ... choosing "show original" and copying the contents to clipboard

#obtain the evilginx phishlet links
root@oco:~$ sudo ./evilginx2 -p /home/azureuser/go/src/github.com/kgretzky/evilginx2/phishlets/
evilginx: lures get-url 0
 https://{subdomain}.{domain}/hmHyBQkP
  - use this evilginx phishlet URL as the links in GoPhish email

root@oco:~$ BROWSER > https://{gophishAdminPortal:3333}
 username: {arbitraryValue}
 password: {arbitraryValue}
 
GoPhish > Email Templates > New Template
 Name: {arbitraryValue}
 Import Email: {paste the copied legitimate activation email}
  - Change Links to Point to Landing Page: enabled
 Subject: {auto-populated based on the pasted contents}
  - modify the links within the email by passing the evilginx phishlet links
     - delete the original links and add the evilginx phishlet links
        - do not forget to hide the extraneous path
        
    OneLogin Portal URL - https://{evilginx phishlet url}
     - hyperlink: https://{evilginx phishlet url}/hmHyBQkP
        - the "hmHyBQkp" parameter must be hidden IOT reduce the visibility of a fake site
 
 Save Template

SENDING PROFILES

this section defines the sender's profile and can be seen by the targets

#obtain the gmail api password
root@oco:~$ BROWSER > https://myaccount.google.com/apppasswords
  2-Step Verification: Enabled
   - 2FA must be enabled on the account IOT to use this feature
  App Name: gophishSendEmail
   {... arbitraryValue}
   - enter your typical gmail password for verification IOT receive the app password
      - App passwords help you sign into your Google Account on older apps and services that don’t support modern security standards.
      - this method is less secure than using up-to-date apps and services that use modern security standards
      
root@oco:~$ BROWSER > https://{gophishAdminPortal:3333}
 username: {arbitraryValue}
 password: {arbitraryValue}
 
GoPhish > Sending Profiles > New Profile
 Name: {arbitraryValue}
 Interface Type: SMTP
 SMTP From: {legitimate email address}
  - IOF targets to open the email and not suspect malicious activity, the email address need to look like its coming from a legitimate sender
     - e.g., it@companyName.com
     - ALT: {Full Name} <email@email.com>
        - target will see full name and email address
 Host: smtp.gmail.com:587
  - this is gmails smtp server
 Username: {real gmail username MUST be used here}
 Password: {enter your gmail app password}
  - this is the APP gmail password and NOT the typical gmail account password
  - do not use your typical gmail account password here as it won't let you connect connect to smtp.gmail.com:587
  
 Save Profile  

Last updated