Simple Phishing Toolkit Rebirth

The spt (rebirth) project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.

spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability.


The Basics

  1. Create and configure the MySQL database. spt will need a MySQL
    database to house its data, so go ahead and create that database and
    configure the associated user account for the new database with ALL
    PRIVILEGES assigned to it. Be sure you record the database name, user
    name and password in a safe place, you’ll need it soon to install spt!
  2. Ensure you have PHP 5.4
  3. Extract the spt files from the archive.
  4. Create a new directory on your web server, such as “spt” and upload the files to the directory.

Install spt

  1. Open your web browser and navigate to the location where you uploaded the files and browse to install.php. For example, http://www.myhost.com/spt/install.php.
    If you accidentally just go to the root of the folder you placed the
    files in, you will be prompted to start the installation by clicking the
    right pointing arrow.
  2. When prompted to accept the GNU General Public License, click the
    “I Agree!” button. For reference, you can read the full text of the
    license in the license.htm file included in the root of the extracted
  3. On the next page, you will get feedback on the readiness of your
    server to install the spt. You can learn more about any failed items by
    hovering over the icon. Click the “Proceed!” button if all checks
    passed, or click the “Proceed Anyways” button if one of the checks
    failed and you have verified that the spt installer is reporting
  4. On the next page, you will need to provide those database details
    from earlier. The default server and database ports are provided, be
    sure to change them if your installation will require something else.
    Enter in the remaining required information and click the “Install
    Database!” button to get things moving along.
  5. If all goes well, you will see a listing of tables that have been successfully created. Click “Continue!” to move on.
  6. If instead you see an error indicated, click the “<back” button to go back and enter the database information again.
  7. Now it’s time to create your first user, for you! Enter your first
    and last name, email address and password and click the “Create User”
    button to continue on.
  8. If you receive any errors, such as for an invalid email address or a
    password that does not meet the complexity requirements, click the
    “<back” button and try it again.
  9. Once you enter the required information successfully, you will
    receive confirmation. Click the “Proceed to Login” button to get logged
    into the spt!
  10. Now it’s time to login using the email address and password you entered in the previous step. See, that was easy!

Download &

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...