On this page
Methodology
This project consists of the following phases:
- PLANNING
- Allow use of phishing tool in client's environment. (If available)
- Collaborate with client point of contact to generate the phishing email, credential harvesting page, and training page that will be utilized in this campaign.
- Test campaign to validate whitelisting was successful and emails will arrive in inboxes as intended.
- Identify the targets for the phishing test.
- PHISHING CAMPAIGN
- Send out phishing emails over period of time specified in scope section.
- Phishing Email - Seemingly legitimate email that attempts to convince users to click on an unknown link to an untrusted domain.
- Credential Harvesting - Users that click on the link in the phishing email will be directed to a login screen to attempt to capture credentials.
- Send out phishing emails over period of time specified in scope section.
- FINDINGS
Client Responsibilities
- Client to assign a point of contact (POC) responsible for client coordination and logistics.
- Client to identify targets for phishing test and provide target names and emails in spreadsheet format (.csv).

Back to Service Library