The explanation in an interesting article by James Coote
Dear security experts, paladins of incident response who spend your days fighting against phishing campaigns, have you ever wondered how it is made a phishing campaign?
This very accurate article by James Coote explains step by step how the bad guys create a perfect phishing campaign using PhishLulz, an Amazon AWS account, a brand new Gmail account and a disposable email.
- Create your free Amazon AWS account
- Create Billing Alarm
- Prepare EC2
- Preparing your host machine
- Customise the Phishlulz codebase
- Create free phishing domain
- Clone the Phishlulz AMI
- Create a new Phishlulz AWS Instance
- Create a new Gmail account
- Create a new Phishlulz Campaign
- Running our Campaign