Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in the cloud for security assessments.
The playbook installs and configures Gophish, Postfix and OpenDKIM on a virtual machine in the cloud. Additionally, for OPSEC purposes, the playbook removes default IOCs (SMTP headers) from Gophish and Postfix servers configurations.
Install
Requirements
- Make sure you have a Linux (Debian, Ubuntu or Kali) instance in the cloud (Amazon EC2, Azure VM, Google GCE…) with a public IPv4 address. Install OpenSSH and enable root access with SSH key-based authentication only.
- Purchase a domain and set it’s DNS records accordingly (A, MX and SPF records must point to your cloud instance’s public IP address).
- Install Ansible on your own machine :
sudo apt install ansible
Installation Steps
- Clone the repository
git clone --recursively https://github.com/VirtualSamuraii/flyphish.git
- Put your cloud instance public IP address in the hosts file.
- Put your phishing domain in the group_vars/all.yml file.
You’re ready to go !
Usage
- Run the playbook and wait for your phishing server to be deployed :
ansible-playbook -i hosts playbook.yml
- Once finished, the playbook displays your DKIM public key. Add this key to your DKIM record in your domain’s DNS zone.
For more information click here.