Overview
Phishing is often necessary when traditional vulnerability exploitation fails. This methodology covers the full lifecycle of a phishing campaign from reconnaissance through credential capture.Campaign Lifecycle
Recon the Victim
- Select the victim domain.
- Find login portals to impersonate via web enumeration.
- Use OSINT to discover email addresses.
Prepare the Environment
- Buy a phishing domain (similar to the victim’s).
- Configure email authentication records: SPF, DMARC, DKIM, rDNS.
- Set up a VPS with GoPhish.
Prepare the Campaign
- Create a convincing email template.
- Build or clone a credential-harvesting web page.
Domain Selection Techniques
Typosquatting Methods
| Technique | Example |
|---|---|
| Keyword addition | zelster.com-management.com |
| Hyphenated subdomain | www-zelster.com |
| New TLD | zelster.org |
| Homoglyph | zelfser.com |
| Transposition | zelsetr.com |
| Omission | zelser.com |
| Repetition | zeltsser.com |
| Insertion | zerltser.com |
Buying Trusted Domains
Search expireddomains.net for expired domains with established reputation. Verify category with:Email Infrastructure Setup
DNS Records Required
DKIM Configuration
Configure DKIM with Postfix and concatenate the B64 key values:Test Your Configuration
GoPhish Configuration
Installation
TLS Certificate
GoPhish config.json
MFA Bypass Techniques
MitM Proxy (evilginx2 / muraena)
These tools act as a transparent proxy between the victim and the real site, capturing sessions including MFA tokens:- Victim visits your phishing page.
- Tool proxies requests to the real site and checks credentials.
- If MFA is requested, the fake page relays it to the real site.
- Once authenticated, you capture credentials, MFA tokens, and session cookies.
VNC Session Phishing
Instead of a fake page, send the victim a VNC session connected to the real website — capturing everything they do.MFA Fatigue / Help-Desk Reset
Modern intrusion sets bypass MFA entirely by targeting the help desk:Recon
Harvest personal details from LinkedIn, data breaches, and public GitHub. Identify the exact help-desk MFA reset process.
Social Engineering
Phone or chat the help desk impersonating the target (with spoofed caller-ID or cloned voice). Provide collected PII to pass knowledge-based verification. Request MFA secret reset or SIM-swap.
AI-Enhanced Phishing
| Layer | Threat Actor Use |
|---|---|
| Automation | Generate 100k+ personalized emails/SMS with randomized wording |
| Generative AI | Produce one-off emails referencing recent M&A or public info; deep-fake CEO voice in callback scams |
| Agentic AI | Autonomously register domains, scrape OSINT, and send next-stage emails when victims click but don’t submit credentials |
LLM-Assisted Runtime JavaScript Stealers
Attackers can ship benign-looking HTML and generate malicious JavaScript at runtime by querying a trusted LLM API:Clipboard Hijacking (Pastejacking)
Attackers silently overwrite the clipboard with malicious commands from a compromised web page, then trick users into pasting them into Win+R or a terminal.Mobile Phishing
- QR social engineering — Fake CERT/ministry pages display a WhatsApp Web QR, silently linking the attacker as a device.
- APK distribution — Malicious Android apps embed spyware, exfiltrating contacts, documents, and device IDs.
- Mobile-gated phishing — Operators detect mobile browsers and serve the phishing page only to mobile users, evading desktop crawlers.