Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in the cloud for security assessments.

The playbook installs and configures Gophish, Postfix and OpenDKIM on a virtual machine in the cloud. Additionally, for OPSEC purposes, the playbook removes default IOCs (SMTP headers) from Gophish and Postfix servers configurations.

Install

Requirements

  • Make sure you have a Linux (Debian, Ubuntu or Kali) instance in the cloud (Amazon EC2, Azure VM, Google GCE…) with a public IPv4 address. Install OpenSSH and enable root access with SSH key-based authentication only.
  • Purchase a domain and set it’s DNS records accordingly (A, MX and SPF records must point to your cloud instance’s public IP address).
  • Install Ansible on your own machine :
sudo apt install ansible

Installation Steps

  • Clone the repository
git clone --recursively https://github.com/VirtualSamuraii/flyphish.git
  • Put your cloud instance public IP address in the hosts file.
  • Put your phishing domain in the group_vars/all.yml file.

You’re ready to go !

Usage

  • Run the playbook and wait for your phishing server to be deployed :
ansible-playbook -i hosts playbook.yml
  • Once finished, the playbook displays your DKIM public key. Add this key to your DKIM record in your domain’s DNS zone.

For more information click here.

LEAVE A REPLY

Please enter your comment!
Please enter your name here