Simple Phishing Toolkit Rebirth

The spt (rebirth) project is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. Organizations spend billions of dollars annually in an effort to safeguard information systems, but spend little to nothing on the under trained and susceptible minds that operate these systems, thus rendering most technical protections instantly ineffective. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.

spt was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability.

INSTALLATION

The Basics

  1. Create and configure the MySQL database. spt will need a MySQL
    database to house its data, so go ahead and create that database and
    configure the associated user account for the new database with ALL
    PRIVILEGES assigned to it. Be sure you record the database name, user
    name and password in a safe place, you’ll need it soon to install spt!
  2. Ensure you have PHP 5.4
  3. Extract the spt files from the archive.
  4. Create a new directory on your web server, such as “spt” and upload the files to the directory.
     

Install spt

  1. Open your web browser and navigate to the location where you uploaded the files and browse to install.php. For example, http://www.myhost.com/spt/install.php.
    If you accidentally just go to the root of the folder you placed the
    files in, you will be prompted to start the installation by clicking the
    right pointing arrow.
  2. When prompted to accept the GNU General Public License, click the
    “I Agree!” button. For reference, you can read the full text of the
    license in the license.htm file included in the root of the extracted
    files.
  3. On the next page, you will get feedback on the readiness of your
    server to install the spt. You can learn more about any failed items by
    hovering over the icon. Click the “Proceed!” button if all checks
    passed, or click the “Proceed Anyways” button if one of the checks
    failed and you have verified that the spt installer is reporting
    incorrectly.
  4. On the next page, you will need to provide those database details
    from earlier. The default server and database ports are provided, be
    sure to change them if your installation will require something else.
    Enter in the remaining required information and click the “Install
    Database!” button to get things moving along.
  5. If all goes well, you will see a listing of tables that have been successfully created. Click “Continue!” to move on.
  6. If instead you see an error indicated, click the “<back” button to go back and enter the database information again.
  7. Now it’s time to create your first user, for you! Enter your first
    and last name, email address and password and click the “Create User”
    button to continue on.
  8. If you receive any errors, such as for an invalid email address or a
    password that does not meet the complexity requirements, click the
    “<back” button and try it again.
  9. Once you enter the required information successfully, you will
    receive confirmation. Click the “Proceed to Login” button to get logged
    into the spt!
  10. Now it’s time to login using the email address and password you entered in the previous step. See, that was easy!

Download & read more at

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...