Phishing Attacks
Overview
Phishing uses electronic communications to manipulate targets into revealing credentials, executing payloads, or performing actions beneficial to the attacker. In authorized assessments, phishing campaigns measure employee susceptibility, security awareness training effectiveness, and incident reporting response times.
All phishing tests require explicit written authorization that defines target scope, allowable pretexts, payload restrictions, and data handling procedures for any credentials captured.
Topics in This Section
- Email Phishing — campaign setup with GoPhish, email crafting with swaks, credential harvesting
- Spear Phishing — targeted attacks, OSINT reconnaissance, evilginx MFA bypass
- Vishing & Smishing — voice and SMS-based social engineering
General Approach
- Scope definition — agree on targets, pretexts, and success criteria
- Reconnaissance — gather organizational intelligence for realistic pretexts
- Infrastructure setup — domains, mail servers, landing pages
- Campaign execution — send phishing, track opens/clicks/submissions
- Reporting — metrics, captured data (handled per data handling agreement), recommendations