Simple Phishing Toolkit Rebirth

The spt (rebirth) project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.

spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability.

INSTALLATION

The Basics

  1. Create and configure the MySQL database. spt will need a MySQL
    database to house its data, so go ahead and create that database and
    configure the associated user account for the new database with ALL
    PRIVILEGES assigned to it. Be sure you record the database name, user
    name and password in a safe place, you’ll need it soon to install spt!
  2. Ensure you have PHP 5.4
  3. Extract the spt files from the archive.
  4. Create a new directory on your web server, such as “spt” and upload the files to the directory.
     

Install spt

  1. Open your web browser and navigate to the location where you uploaded the files and browse to install.php. For example, http://www.myhost.com/spt/install.php.
    If you accidentally just go to the root of the folder you placed the
    files in, you will be prompted to start the installation by clicking the
    right pointing arrow.
  2. When prompted to accept the GNU General Public License, click the
    “I Agree!” button. For reference, you can read the full text of the
    license in the license.htm file included in the root of the extracted
    files.
  3. On the next page, you will get feedback on the readiness of your
    server to install the spt. You can learn more about any failed items by
    hovering over the icon. Click the “Proceed!” button if all checks
    passed, or click the “Proceed Anyways” button if one of the checks
    failed and you have verified that the spt installer is reporting
    incorrectly.
  4. On the next page, you will need to provide those database details
    from earlier. The default server and database ports are provided, be
    sure to change them if your installation will require something else.
    Enter in the remaining required information and click the “Install
    Database!” button to get things moving along.
  5. If all goes well, you will see a listing of tables that have been successfully created. Click “Continue!” to move on.
  6. If instead you see an error indicated, click the “<back” button to go back and enter the database information again.
  7. Now it’s time to create your first user, for you! Enter your first
    and last name, email address and password and click the “Create User”
    button to continue on.
  8. If you receive any errors, such as for an invalid email address or a
    password that does not meet the complexity requirements, click the
    “<back” button and try it again.
  9. Once you enter the required information successfully, you will
    receive confirmation. Click the “Proceed to Login” button to get logged
    into the spt!
  10. Now it’s time to login using the email address and password you entered in the previous step. See, that was easy!

Download & read more at

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...