- A Route 53
Hosted Zone
is created for each phishing domain - An
Amazon Certificate Manager
SSL cert is provisioned and verified for each Domain using Route 53 - DNS records point to an
Application Load Balancer
with allACM
Certs attached - The
ALB
forwards traffic to an Autoscaling group with oneEC2
instance running Gophish
-
Clone this repo
-
Edit
config.yaml
with your preferences -
Ensure AWS CLI is configured and authenticated
-
Deploy hosted zones for each phishing domain:
./manage.sh update_zones
- Update NS records for each domain to the nameservers listed in script output Example:
Domain: phish.com
ns-219.awsdns-27.com
ns-1365.awsdns-42.org
ns-797.awsdns-35.net
ns-1828.awsdns-36.co.uk
- Once the records have propogated, build and deploy the Gophish stack:
./manage.sh update_platform