Introduction
Setting the stage for things to come.
- We are going to setup phishing infrastructure.
- Our infrastructure will allow us to:
- Manage phishing campaigns (Gophish).
- Send emails (MailHog for testing, ??? for production).
- Coordinate requests between users and a login provider (Modlishka).
- Hide from detections / bots.
- Acquire a CSV of users to target (First Name, Last Name, Email, Role).