Cyber security

Flyphish : Mastering Cloud-Based Phishing Simulations For Security Assessments

Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in the cloud for security assessments.

The playbook installs and configures Gophish, Postfix and OpenDKIM on a virtual machine in the cloud. Additionally, for OPSEC purposes, the playbook removes default IOCs (SMTP headers) from Gophish and Postfix servers configurations.

Install

Requirements

  • Make sure you have a Linux (Debian, Ubuntu or Kali) instance in the cloud (Amazon EC2, Azure VM, Google GCE…) with a public IPv4 address. Install OpenSSH and enable root access with SSH key-based authentication only.
  • Purchase a domain and set it’s DNS records accordingly (A, MX and SPF records must point to your cloud instance’s public IP address).
  • Install Ansible on your own machine :
sudo apt install ansible

Installation Steps

  • Clone the repository
git clone --recursively https://github.com/VirtualSamuraii/flyphish.git
  • Put your cloud instance public IP address in the hosts file.
  • Put your phishing domain in the group_vars/all.yml file.

You’re ready to go !

Usage

  • Run the playbook and wait for your phishing server to be deployed :
ansible-playbook -i hosts playbook.yml
  • Once finished, the playbook displays your DKIM public key. Add this key to your DKIM record in your domain’s DNS zone.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago