Phishing with GoPhish and DigitalOcean
Last updated
Last updated
This lab is dedicated to exploring one of the phishing frameworks GoPhish. I will be installing and configuring GoPhish on a DigitalOcean VPS running Ubuntu Linux distribution.
The dropled that I have created got assigned an IP address 68.183.113.176
Let's login to the VPS and install the mail delivery agent:
Point mynetworks
variable in postfix config to the IP we got assigned in DigitalOcean:
Create an A
record mail
that points to the VPS IP and an MX
record that points to mail.yourdomain
:
Launching GoPhish is simple:
GoPhish admininistration panel is bound to 127.0.0.1:3333 by default, so we can either modify the config and change it to listen on 0.0.0.0 (all interfaces) if we want to access the admin panel from the Internet or create a local SSH tunnel if we want to restrict access to local network only. Let's do an SSH tunnel:
We can now access the GoPhish admin panel via https://127.0.0.1:3333
from our Kali box. After creating user groups (phish targets), landing pages (phishing pages victims will see if they click on our phishing links), etc, we can create an email template - the email that will be sent to the unsuspecting victims as part of a phishing campaign that we will create in the next step:
Below is a quick demo of how a new campaign is put together once all the other pieces mentioned above are in place (users, templates, landing pages):
Below is the actual end result of our mock phish campaign:
The URL found in the above phish email takes the user to our mock phishing page:
Switching to Campaigns
section of the admin panel, we can see how many emails were sent as part of the campaign, how many of them were opened and how many times the phishing URL was clicked: