How to Detect Phishing Mails and Websites
Not long ago, phishing websites and mails looked quite unprofessional, they were peppered with spelling mistakes and had a distrustful design. Nowadays the digital fraudsters
usage: spf.py [-h] [-f <list.txt>] [-C <config.txt>] [--all] [--test] [-e] [-g] [-s] [--simulate] [-w] [-W] [-d <domain>] [-c <company's name>] [--ip <IP address>] [-v] [-y] optional arguments: -h, --help show this help message and exit -d <domain> domain name to phish -c <company's name> name of company to phish --ip <IP address> IP of webserver defaults to [192.168.1.124] -v, --verbosity increase output verbosity input files: -f <list.txt> file containing list of email addresses -C <config.txt> config file enable flags: --all enable ALL flags... same as (-e -g -s -w) --test enable all flags EXCEPT sending of emails... same as (-e -g --simulate -w -y -v -v) -e enable external tool utilization -g enable automated gathering of email targets -s enable automated sending of phishing emails to targets --simulate simulate the sending of phishing emails to targets -w enable generation of phishing web sites -W leave web server running after termination of spf.py misc: -y automatically answer yes to all questions
cd spf python spf.py --test -d example.com
cd spf python web.py default.cfg
Download and read more
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Not long ago, phishing websites and mails looked quite unprofessional, they were peppered with spelling mistakes and had a distrustful design. Nowadays the digital fraudsters
Don’t Get Hooked by Phishing. Pandemic hasn’t only brought the disease with itself but has also brought security risks for all the organizations. Because of
Phishing is a type of cyberattack that aims to trick people into giving up their sensitive information or hack into a system by means of
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings