https://github.com/navneeth31/phishing-attack-demo
Educational phishing simulation using ZPhisher on Kali Linux to demonstrate credential harvesting techniques.
https://github.com/navneeth31/phishing-attack-demo
cybersecurity ethical-hacking kali-linux phishing-simulation security-awareness social-engineering zphisher
Last synced: 5 months ago
JSON representation
Educational phishing simulation using ZPhisher on Kali Linux to demonstrate credential harvesting techniques.
- Host: GitHub
- URL: https://github.com/navneeth31/phishing-attack-demo
- Owner: navneeth31
- Created: 2025-05-18T09:48:14.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2025-05-29T11:31:16.000Z (5 months ago)
- Last Synced: 2025-05-29T13:05:20.012Z (5 months ago)
- Topics: cybersecurity, ethical-hacking, kali-linux, phishing-simulation, security-awareness, social-engineering, zphisher
- Language: Shell
- Homepage:
- Size: 55.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
***ZPhishier – Social Media Phishing Simulaton***
-----
**Summary**
ZPhishier is an educational phishing-simulation project built with ZPhisher on Kali Linux, running in a local VM environment. It automates the creation of cloned social-media login pages, demonstrating how easily credentials can be harvested from unsuspecting users. This documentation covers objectives, setup, execution details, results, and recommended best practices for security awareness and prevention.
-----
**Objective**
- To illustrate phishing mechanics ethically for security awareness and training.
- To demonstrate capture of credentials via cloned login pages.
**Scope**
- Simulation only (no real targets).
- Local-only deployment (VM).
- Focused on social-media site templates.
-----
**Legal & Ethical Disclaimer**
**Important:** This tool is strictly for educational and awareness purposes. Unauthorized phishing—against real users or networks—is illegal and unethical. Always obtain explicit permission before any penetration testing or phishing simulations [IRJMETS](https://www.irjmets.com/uploadedfiles/paper/issue_12_december_2024/65449/final/fin_irjmets1734768076.pdf?utm_source=chatgpt.com)[GitHub](https://github.com/htr-tech/zphisher?utm_source=chatgpt.com).
-----
**Attack Overview**
**-Phishing Type**
Cloning of popular social media login pages (e.g., Facebook, Instagram) to harvest credentials.
**-Delivery Method**
Links are generated and tested locally; no external distribution in this demo.
**-Target Audience**
General public (demonstration only on the attacker’s own machine).
-----
**Tools & Environment**
- **ZPhisher**: automated open-source phishing tool with 30+ templates.
- **Operating System**: Kali Linux (inside a virtual machine).
- **Environment**: Local VM (no public hosting).
-----
**Setup & Configuration**
1. **VM Preparation**
1. Spin up a Kali Linux VM (VirtualBox/VMware).
2. Ensure Internet access within VM for installing dependencies.
2. **Install ZPhisher**
3. **Launch ZPhisher**
Bash ./zphisher.sh

4. Choose the social-media template.

5. Select “Localhost” or “Cloudflared/LocalXpose” (for local demos, localhost is sufficient).
-----
**Execution Steps**
1. **Generate Phishing Link**
1. ZPhisher displays a URL (e.g., http://localhost:8080/facebook).
1. **Simulate User Interaction**
1. Open the link in a browser tab.
1. Enter any credentials (email/username + password).
1. **Credential Capture**
1. ZPhisher logs credentials in the terminal and saves them to logs/ directory.
-----
**Results & Analysis**
- **Captured Data**
- Plaintext usernames/passwords printed in terminal and stored on disk.
- **Security Triggers**
- No automated detection in this local setup (real-world defenses like anti-phish filters would block such URLs).
-----
**Mitigation & Recommendations**
**“Do not click on suspicious, catchy messages from unknown sources.”**
1. **User Training**
1. Regular phishing awareness programs with simulated tests [CISA](https://www.cisa.gov/secure-our-world/teach-employees-avoid-phishing?utm_source=chatgpt.com)[CybeReady](https://cybeready.com/phishing-awareness-training/phishing-prevention-best-practices?utm_source=chatgpt.com).
1. Teach employees to verify links and check sender domains before interacting [Microsoft Support](https://support.microsoft.com/en-us/windows/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184-430e1f860a44?utm_source=chatgpt.com).
1. **Incident Response**
1. Establish clear reporting channels for suspected phishing (e.g., “Report Phish” button).
1. Conduct follow-up training for any user who clicks or submits credentials