Initial Access with King Phisher

King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.
Course info
Level
Intermediate
Updated
Oct 14, 2020
Duration
28m
Table of contents
Description
Course info
Level
Intermediate
Updated
Oct 14, 2020
Duration
28m
Description

Through the use of phishing techniques, you'll learn the skills and understanding to further your red teaming objectives towards initial access. In this course, Initial Access with King Phisher, you’ll see how to utilize King Phisher to execute a phishing attack in a red team environment. First, you’ll demonstrate your ability to identify a victim and enumerate DNS to craft a successful phishing campaign. Next, you’ll apply a spearphishing technique to target a victim. Finally, you’ll simulate harvesting victim credentials by crafting a landing page to use in the attack. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques. Phishing: Spearphishing Link-T1566.002 & Valid Accounts-T1078 using King Phisher.

About the author
About the author

Jeff Stein is an Information Security Architect. He holds a master’s degree in Information Security & Assurance and numerous security and IT certifications, including his CISSP.

More from the author
Command and Control with PoshC2
Intermediate
27m
Oct 15, 2020
Credential Access with Cain & Abel
Intermediate
25m
Jul 28, 2020
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to Pluralsight and the cyber security tools course featuring King Phisher, the open source phishing toolkit developed by SecureState and currently maintained by RSM. King Phisher is a tool which red team members who are looking to gain initial access to a system or credentials can use during attack engagement. Using King Phisher, you can leverage phishing tactics to build complex attack scenarios with capabilities to both coordinate and monitor the success of your phishing campaigns. A vast array of templates complement the tooling, allowing you to integrate landing pages into your attack scenario to not only increase the likelihood of achieving initial access, but also to assist in gathering credentials to further your red teaming objectives. If you would like to learn how to use King Phisher to create phishing campaigns to gain initial access, come join me and explore the power of King Phisher.