Search Results for: phishing attacks

Installing GoPhish on Kali Linux for Phishing Campaigns

Installing GoPhish on Kali Linux for Phishing Campaigns

Phishing is one of the most common attacks in today’s cybersecurity world. Many hackers from noob to pro all uses this method to gain access by tricking human’s brain. But these days humans are clever enough to get trapped in this.

Suppose we create a landing page of any popular website (for suppose Facebook) and send the target a email to the client that you have $200 unused advertising credit to be expire soon and when the user comes to the the landing page and there he suppose to provide his card details to get the free credit. Now these type of attacks generally not working. May work sometime for some targets because phishing is a very subjective attack but in most cases it really don’t work. A proper phishing campaign will be more effective for a bulk phishing attack.

Understanding Phishing Campaigns

In bulk phishing attack attack didn’t create the landing page and email for a specific people. They create those things in a very generic way and send the email to a large number of people. By using phishing campaign attackers try to trick people into giving up sensitive information, such as passwords, credit card numbers, or other various personal details. Attackers often do this by sending emails that appear to be from a legitimate source, like a bank or any well known brand. The email usually contains a link to a fake website that looks real. When the person enters their information on this fake site, the attackers steal it. Phishing Campaigns are well organized way to try phishing.

Installing GoPhish on Kali Linux

GoPhish on Kali Linux

GoPhish is an open-source tool to run a phishing campaign. It is designed to help organizations to run phishing attack on their employees and educated them about this type of attacks. GoPhish is also used by bad attackers. Previously we need to install it from GitHub and there are many errors to run this on Kali Linux. Now we can install it easiest method ever.

In today’s article we are going to learn how we can easily install GoPhish on our Kali Linux system and run it. Now this is very simple to do it. GoPhish is now available on Kali Linux repository so we just need to run following command to install it:

sudo apt install gophish -y

It requires password of user for authentication. In the following screenshot we can see the screenshot of applied command:

installing Gophish on Kali Linux

Now we can run GoPhish on our Kali Linux system by using following command:

sudo gophish

It may prompt for password and then it will start as we can see in the following screenshot:

gophish running on kali linux

Here we can see the link of GoPhish web application and we also can see default web admin login and password. Let’s open the link on our web browser.

Got an warning on gophish web

Opps…. We got a warning because this localhost web panel doesn’t have a certificate issued by a trusted certificate authority. No issue its running inside our system. So we click on the “Advanced” option and then click on the “Accept the Risk and Continue” option.

Gophish warning problem solved on Kali Linux

After that GoPhish login panel will be in front of us, as we can see in the following screenshot:

GoPhish web login panel on Kali Linux

We got the default username and password on the terminal window, we can login by using that credentials. Just after that GoPhish will prompt for resetting the password. We must need to change the default password for security seasons. Here we have to choose a strong password and set it. After that we are finally at the GoPhish web interface. Initially it looks like following screenshot:

GoPhish on Kali Linux

Now here we can create phishing campaigns and manage it easily. We are going to spoon feed everything. Researching own things are one of the best way to learn. Directly demonstrating of running a phishing campaigns on a public domain is not so much ethical in our opinion. But everything is there on the “User guide” option.

GoPhish sucessfully running

On the “User Guide” and “API Documentation” we got everything we need to learn. Like on the “User Guide” we get a well organized menu for every options, as we can see in the following screenshot:

GoPhish User Guide on Kali Linux

This is how we can install and run GoPhish on Kali Linux system. GoPhish is a very powerful tool which simplifies the process of organizing phishing simulations. By using GoPhish on Kali Linux, we can effectively test and improve our organization’s resilience to phishing attacks.

Warning: This article is for research and educational purposes only. We are not responsible for any actions or damages resulting from using this information. Use GoPhish only having explicit permission to test. Unauthorized use can result in legal consequences. We strongly advise ethical and responsible usage.

Love our article? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group & Whatsapp Channel. We are striving to build a community for Linux and cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

February 22, 2024 Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam emails to propagate war-related disinformation. The activity has been linked to Russia-aligned threat actors by Slovak cybersecurity company ESET, which also identified a spear-phishing campaign aimed at a Ukrainian defense company in October 2023 and a European Union agency …

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks Read More »

Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative

February 21, 2024 Hackers backed by Iran and Hezbollah staged cyber attacks designed to undercut public support for the Israel-Hamas war after October 2023. This includes destructive attacks against key Israeli organizations, hack-and-leak operations targeting entities in Israel and the U.S., phishing campaigns designed to steal intelligence, and information operations to turn public opinion against …

Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative Read More »

Malicious ‘SNS Sender’ Script Abuses AWS for Bulk Smishing Attacks

February 17, 2024 A malicious Python script known as SNS Sender is being advertised as a way for threat actors to send bulk smishing messages by abusing Amazon Web Services (AWS) Simple Notification Service (SNS). The SMS phishing messages are designed to propagate malicious links that are designed to capture victims’ personally identifiable information (PII) and payment …

Malicious ‘SNS Sender’ Script Abuses AWS for Bulk Smishing Attacks Read More »

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

January 5, 2024 The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade detection from security software. “The group’s weapon of choice is Remcos RAT, a notorious malware for remote surveillance and control, which has been at the forefront of its espionage arsenal,” Uptycs security researchers …

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT Read More »

Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks

December 31, 2023 Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets. “These threats are unique in their approach, targeting a wide range of blockchain networks, from Ethereum and Binance Smart Chain to Polygon, Avalanche, and almost 20 other networks by using a crypto wallet-draining technique,” Check …

Beware: Scam-as-a-Service Aiding Cybercriminals in Crypto Wallet-Draining Attacks Read More »

Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks

December 30, 2023 Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of backdoors and tools such as AppleSeed, Meterpreter, and TinyNuke to seize control of compromised machines. South Korea-based cybersecurity company AhnLab attributed the activity to an advanced persistent threat group known as Kimsuky. “A notable point about …

Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks Read More »

BazaCall Phishing Scammers Now Leveraging Google Forms for Deception

December 14, 2023 The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the scheme a veneer of credibility. The method is an “attempt to elevate the perceived authenticity of the initial malicious emails,” cybersecurity firm Abnormal Security said in a report published today. BazaCall (aka BazarCall), which was first Article posted by: …

BazaCall Phishing Scammers Now Leveraging Google Forms for Deception Read More »

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

December 14, 2023 Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. “Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious activity,” the Microsoft Threat Intelligence …

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing Read More »

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

December 9, 2023 The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised systems. “The threat actor ultimately uses a backdoor to steal information and execute commands,” the AhnLab Security Emergency Response Center (ASEC) said in an …

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.