Simulated phishing server

During my school internship I had to develop few interesting tasks. Previously I talked about the USB reverse shell program I built, but there was another very interesting exercise I was tasked with creating and that was a forensics exercise where the one doing the exercise would have to analyze the phishing server log files to determine –

  1. Who sent the phishing emails.
  2. Which users received these emails.
  3. Which users opened the emails.
  4. Which users entered their credentials on the phishing site.

Here’s how I approached the task:

Read more