Simple Phishing Toolkit Rebirth

The spt (rebirth) project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.

spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability.

INSTALLATION

The Basics

  1. Create and configure the MySQL database. spt will need a MySQL
    database to house its data, so go ahead and create that database and
    configure the associated user account for the new database with ALL
    PRIVILEGES assigned to it. Be sure you record the database name, user
    name and password in a safe place, you’ll need it soon to install spt!
  2. Ensure you have PHP 5.4
  3. Extract the spt files from the archive.
  4. Create a new directory on your web server, such as “spt” and upload the files to the directory.
     

Install spt

  1. Open your web browser and navigate to the location where you uploaded the files and browse to install.php. For example, http://www.myhost.com/spt/install.php.
    If you accidentally just go to the root of the folder you placed the
    files in, you will be prompted to start the installation by clicking the
    right pointing arrow.
  2. When prompted to accept the GNU General Public License, click the
    “I Agree!” button. For reference, you can read the full text of the
    license in the license.htm file included in the root of the extracted
    files.
  3. On the next page, you will get feedback on the readiness of your
    server to install the spt. You can learn more about any failed items by
    hovering over the icon. Click the “Proceed!” button if all checks
    passed, or click the “Proceed Anyways” button if one of the checks
    failed and you have verified that the spt installer is reporting
    incorrectly.
  4. On the next page, you will need to provide those database details
    from earlier. The default server and database ports are provided, be
    sure to change them if your installation will require something else.
    Enter in the remaining required information and click the “Install
    Database!” button to get things moving along.
  5. If all goes well, you will see a listing of tables that have been successfully created. Click “Continue!” to move on.
  6. If instead you see an error indicated, click the “<back” button to go back and enter the database information again.
  7. Now it’s time to create your first user, for you! Enter your first
    and last name, email address and password and click the “Create User”
    button to continue on.
  8. If you receive any errors, such as for an invalid email address or a
    password that does not meet the complexity requirements, click the
    “<back” button and try it again.
  9. Once you enter the required information successfully, you will
    receive confirmation. Click the “Proceed to Login” button to get logged
    into the spt!
  10. Now it’s time to login using the email address and password you entered in the previous step. See, that was easy!

Download & read more at

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...