Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Breaching The Perimeter With Enterprise Phishing
Section 1 : Introduction
1. Welcome! (3:26)
2. What is Enterprise Phishing? (7:04)
3. What is 2FA? (5:34)
4. The Attack Plan (4:53)
5. The Human Psychology of Phishing (9:03)
Section 2 : The Setup!
6. Creating a Phishing Email (14:30)
7. Free vs Paid Domains (3:21)
8. Free vs Paid Emails (6:37)
9. Finding our Domain (6:28)
10. Finding our Email Targets (3:58)
11. Domain & Email Hosting (4:51)
Section 3 : Working With AWS
12. Leveraging AWS for our Infrastructure (2:41)
13. Building our Custom EvilGinx2 EC2 AMI (14:31)
14. Building our Custom GoPhish EC2 AMI (10:09)
15. Creating our S3 Bucket (4:28)
Section 4 : Phishing Setup
16. What is EvilGinx2? (17:10)
17. What is GoPhish? (12:53)
18. Custom Automation for EvilGinx2 & S3 (28:19)
Section 5 : Conclusion!
19. Full Attack Scenario (18:48)
20. How to Beat This Attack (3:40)
Audio Version of Training
Audio Download
6. Creating a Phishing Email
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock