Hands on Phishing

Wishlist Share

About Course

Tired of theoretical phishing courses? This is the definitive, hands-on training for penetration testers and red team operators who need to move beyond theory and execute realistic, effective phishing campaigns against modern, hardened targets. In this course, you won’t just learn about phishing—you’ll build, launch, and manage full-scale campaigns using industry-standard tools like GoPhish and the powerful Evilginx framework, learning to bypass Multi-Factor Authentication (MFA) and common email defenses.

Syllabus

  1. Welcome to the Course
  2. Configuring the Lab Environment
  3. Preparing for a Successful Phishing Trip
  4. GoPhish Setup and Initial Configuration
  5. Launching a Phishing Campaign with GoPhish
  6. Phishing with Evilginx
  7. Bypassing Common Defenses
  8. Combining Pretext Calling with Phishing
  9. Course Conclusion

Course Content

Course

  • Creating an Account on Digital Ocean
    00:00
  • Setting Up Billing & Billing Alerts
    00:00
  • Creating an Ubuntu Droplet
    00:00
  • Setting up Firewall Rules
    00:00
  • Analysis of Bad Phishing Emails (Avoid This!)
    00:00
  • Performing Basic OSINT on the Target
    00:00
  • [Walkthrough] Compile a List of Users and Emails
    00:00
  • [Walkthrough] Identifying a Login Page to Clone
    00:00
  • [Walkthrough] Identify The "Secret" User
    00:00
  • Strategies for Selecting a Domain
    00:00
  • Purchasing a Domain with Namecheap
    00:00
  • Configuring GSuite with the Domain
    00:00
  • Overview of GoPhish
    00:00
  • Installing GoPhish on Ubuntu
    00:00
  • Setting up Certs and Launching GoPhish
    00:00
  • [Challenge] Automate With a Script
    00:00
  • Configuring DNS for the Domain
    00:00
  • Setting up Email Templates
    00:00
  • [Walkthrough] – Create a Phishing Email
    00:00
  • Configuring the Landing Page
    00:00
  • Adding Target Users
    00:00
  • Creating the Sending Profile
    00:00
  • [Walkthrough] Launch Your First Campaign
    00:00
  • Overview of Evilginx
    00:00
  • Installing and Configuring Evilginx
    00:00
  • Brief Overview of Phishlets
    00:00
  • Configuring Your First Phishlet
    00:00
  • [Walkthrough] Create a Custom Phishlet for Self-Hosted WordPress
    00:00
  • [Walkthrough] Re-Using Stolen Session Cookies
    00:00
  • Difference Between a Penetration Test and Red Team Engagement
    00:00
  • Leverage Known Services
    00:00
  • Build Infrastructure Trust
    00:00
  • Overview of Pretext Calling
    00:00
  • Creating an Effective Pretext
    00:00
  • Setting up SpoofCard
    00:00
  • Setting up Google Voice
    00:00
  • [Walkthrough] Call Yourself With a Spoofed Number
    00:00
  • Note on Legality of Recording Calls
    00:00
  • Practical Projects
    00:00
  • Next Steps for your Career
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet