1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00

GitBook: [master] one page modified

This commit is contained in:
CPol 2020-12-07 23:19:28 +00:00 committed by gitbook-bot
parent 7b3e909caf
commit f6e602b26e
No known key found for this signature in database
GPG key ID: 07D2180C7B12D0FF

View file

@ -43,9 +43,15 @@ The more common they are, the more probable the AV will detect it.
1. Recon the victim
1. Select the victim domain.
2. Preform some basic web enumeration searching for login portals used by the victim and decide which one you will impersonate.
3. Use some OSINT to find emails of the domain
3. Use some OSINT to find emails.
2. Prepare the environment
1. Buy the domain you are going to use for the phishing assessment
2. Configure the email service related records \(SPF, DMARC, DKIM, rDNS\)
3. Configure the VPS with gophish
3. Prepare the templates
1. Prepare the email template to redirect to the malicious web page
2. Prepare the web page to steal the credentials
4. Launch the attack!
## Generate similar domain names