Explore social engineering techniques to execute a malicious link phishing campaign and discover how to simulate a malicious attachment attack.
Are you looking for a tool that can quickly and easily set up phishing campaigns and host its own landing pages? In this course, Initial Access with Gophish, you’ll cover how to utilize Gophish to complete Initial Access in a red team environment. First, you’ll see how to install Gophish and navigate through its features. Next, you’ll explore social engineering techniques to execute a malicious link phishing campaign and capture credentials. Finally, you’ll discover how to simulate a malicious attachment attack to gain access to your target. When you’re finished with this course, you’ll have the skills and knowledge to execute this technique - T1566: Spearphishing using Gophish.
Are you looking for a tool that can quickly and easily set up phishing campaigns and host its own landing pages? In this course, Initial Access with Gophish, you’ll cover how to utilize Gophish to complete Initial Access in a red team environment. First, you’ll see how to install Gophish and navigate through its features. Next, you’ll explore social engineering techniques to execute a malicious link phishing campaign and capture credentials. Finally, you’ll discover how to simulate a malicious attachment attack to gain access to your target. When you’re finished with this course, you’ll have the skills and knowledge to execute this technique - T1566: Spearphishing using Gophish.