
Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. This user guide introduces Gophish and shows how to use the software, building a complete campaign from start to finish.
the usage of gophish and very neat installation procedures inspired by note post on ired.team blog . so i will get brief installation of gophish with postfix server first then . bypass Digital ocean public IP address blacklisted .
installation of postfix server
apt-get install postfix
configuration of postfix
then you have to modify the following value as your own digital ocean droplet
nano /etc/postfix/main.cf
myhostname = {SMTP SERVER }
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
mydestination = $myhostname, ubt, ubuntu-s-1vcpu-1gb-fra1-01, localhost.localdomain, localhost
relayhost =
mynetworks={PUBLIC_IP_ADDRESS}
after saving these information , you have to reload postfix configuration
service postfix reload
from your terminal , execute the following commands
wget https://github.com/gophish/gophish/releases/download/0.7.1/gophish-v0.7.1-linux-64bit.zip apt install unzip
unzip gophish-v0.7.1-linux-64bit.zip
chmod +x gophish
after installation is finished , run it ./gophish
## Access GoPhish by SSH tunneling
gophish in default is running on local interface with port 3333 , so we have to start ssh tunneling to access it
ssh root@ipofdroplet -L3333:localhost:3333 -N -f
access it `https:\\localhost:3333`
installation of Free SSL Certification for Postfix or Gophish
apt install certbot
generate ssl certification
certbot certonly --standalone -d mail.phish.com
the paths of certifications comes as following examples
/etc/letsencrypt/live/mail.phish.com/
to activate ssl on **postfix** you have to edit `main.cf` as
smtpd_tls_cert_file=/etc/letsencrypt/live/mail.phish.com/fullchain.pem
smtpd_tls_key_file=/etc/letsencrypt/live/mail.phish.com/privkey.pem
in case want to activate ssl certification on Gophish , edit config.json
and replace it with correct path
"admin_server": {
"listen_url": "127.0.0.1:3333",
"use_tls": true,
"cert_path": "gophish_admin.crt",
"key_path": "gophish_admin.key"
},
"phish_server": {
"listen_url": "0.0.0.0:80",
"use_tls": false,
"cert_path": "example.crt",
"key_path": "example.key"
Bypass Blocked Public IP While sending through SMTP
access your droplet via ssh then execute the following command first
curl -s 169.254.169.254/metadata/v1/interfaces/public/0/anchor_ipv4/gateway
then copy the ip address from output and execute the following
route add default gw {IP}
route del default gw
to validate execute the following from box cli
curl icanhazip.com