Gophish is the open source, free, enterprise phishing solution of choice
- Timmy TSENG
- Apr 14, 2024
- 2 min read
In today's context of increasing cybersecurity awareness, fighting against phishing attacks has become increasingly important. Gophish is an open-source phishing simulation tool that can help companies and organizations conduct phishing attack tests and improve employees' cybersecurity awareness. This article will introduce Gophish software in detail, including installation methods, software instructions, advantages, and conclusions.
1. Software Description
Gophish has the following core functions:
Email templates: used to create email content and styles for simulated phishing attacks.
Login Page Template: Used to create a login page for a simulated phishing attack.
Mail server configuration: Set up the mail server used to send phishing emails.
Recipient Groups: Group test objects for easier management and analysis.
Run a simulated phishing attack: Select the appropriate email template, login page template, mail server configuration, and recipient groups to start a simulated phishing attack.
Data Analysis: Gophish collects data from attacks so that users can analyze and improve cybersecurity awareness training.
2. Advantages
Open source and free: Gophish is an open source software, free for both commercial and individual users, reducing the cost of use for enterprises and organizations.
Easy to use: Gophish has an intuitive interface that even beginners can quickly get started without the need for complex network security expertise.
High security: Gophish is only used to simulate phishing attacks and does not involve actual network intrusion behavior, providing a secure network environment testing platform for enterprises and organizations.
Data visualization: Gophish can display the data collected during the fishing test in the form of charts to help users intuitively understand the test results and security risks.
High flexibility: Gophish supports custom email templates and login page templates. Users can conduct tests according to their own needs to improve the targetedness of the test.
3. Conclusion
As an open-source phishing simulation tool, Gophish has become an important choice for enterprises and organizations to enhance their network security awareness due to its ease of use, security, and flexibility. By using Gophish to simulate phishing attack tests, enterprises and organizations can promptly discover potential security risks and take effective preventive measures to ensure network security.
Practical application case teaching
Buy a domain
Buy similar phishing domains at name.com

Create a Titan Mail Account
Purchase Titan's email value-added services from name

After purchasing from this place, you can create an email address with your own domain name.
Build Gophish server
Create a cloud server on GCP

Here we use Ubuntu 20.04, and make sure to enable HTTP and HTTPS traffic at the bottom.

After creating the machine, we use the browser to enter the machine

Update apt version
sudo apt-get update

Download gophish
git clone https://github.com/gophish/gophish.git

Install golang
sudo apt install golang-go

Compile gophish
go build gophish.go

After compilation, gophish will be generated

Modify the config.json configuration and change the listen_url in admin_server to 0.0.0.0:3333

sudo ./gophish
Start the gophish service and you can see the account password and access address.

Add GCP firewall to allow access to port 3333
Enter the firewall page

Create a Policy

The policy content allows inbound traffic on port 3333 of all entities in the project.

Configure gophish service
Visit https://130.211.243.223:3333/ (please refer to your own GCP machine for the IP address)
Log in using the account and password displayed in the console just now

Change password according to the prompts when logging in for the first time

Log in to gophish homepage

Create a recipient template named timmy, which contains a recipient email address qoo7972365@gmail.com

Create a template named timmy_mail, with the sender as timmy@timmy.life, and the content
First, download the email content of purchasing the domain name in gmail

Use a text editor to open the downloaded email content and copy all the content

Select import email, paste all the content into it, and check change Links to Landing page

Check add track image and save.

Create a phishing email, create a page named name, and directly enter https://www.name.com/zh-cn/account/login in the import site field

Create a fishing profile named timmy_titian, which contains the sender configuration

Before saving, you can click Send Test Email and enter the recipient for testing. The following is the test email successfully received

A fishing attack is launched
Set the first attack content in the campaign

After starting, you can see in the panel that an email has been sent to the inbox qoo7972365@gmail.com

Check the received phishing email in the mailbox and you can see that the link in the email has been replaced with the phishing page.
https://130.211.243.223/name?rid=L65ExKj

Click the link here and you will be redirected to the phishing page we set up. Enter your account and password on the phishing page and they will be recorded and you will be redirected back to the official name.com homepage.

Go back to the gophish homepage and you can see the account and password that have been recorded.

Comments