GoPhish Credential Harvesting Simulation

This project documents a controlled phishing simulation conducted as part of a cybersecurity class. The goal was to design, deploy, and analyze a credential-harvesting phishing campaign using GoPhish, cloned landing pages, and a realistic social engineering pretext.

Ethical & Legal Notes:
• Fully authorized, instructor-approved simulation
• No real individuals or organizations targeted
• All accounts and infrastructure were isolated test environments
• Participants provided opt-in consent and were debriefed afterward
• No real credentials or personal data were collected

1. Campaign Goal & Defensive Value

Objective: Simulate a realistic phishing attack designed to harvest credentials through a spoofed “security alert” email.

Behavioral Goal:

Security Value:

2. Target Profile (Simulated)

Simulated User Persona:

Environmental Vulnerability: The persona relies heavily on professional networking platforms, making a spoofed “security alert” email a plausible attack vector.

Privacy & Scope: All reconnaissance was performed on fictional accounts created solely for this lab.

3. Attack Chain Simulation

Attacker Infrastructure:

Delivery Mechanism:

Exploit Workflow:

4. Email Construction

Design Process:

Final Email Characteristics:

5. Landing Page Construction

Design Inspiration: A cloned version of a professional networking site’s password reset page.

Technical Stack:

AI Usage: Used Gemini 3 to generate initial HTML/CSS, refine layout, and improve UI realism.

Final Output Capabilities:

6. Defensive Takeaways

Email Security:

User Behavior:

Detection Opportunities:

Mitigation Strategies:

Final Thoughts

Running a controlled phishing simulation was one of the most eye-opening exercises in my homelab. It demonstrated how effective even basic social engineering can be — and how defenders must think like attackers to build stronger protections.

If you're interested in replicating this ethically, start with open-source tools like GoPhish or King Phisher, always obtain explicit consent, and debrief participants immediately.

(Last updated: January 2026)