This story was originally published on HackerNoon at:
https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
Check more stories related to cybersecurity at:
https://hackernoon.com/c/cybersecurity.
You can also check exclusive content about
#phishing,
#hacking,
#red-team,
#nginx,
#phishing-email,
#golang,
#cybersecurity,
#phishing-simulations, and more.
This story was written by:
@matejsmycka. Learn more about this writer by checking
@matejsmycka's about page,
and for more stories, please visit
hackernoon.com.
I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.