This project simulates a phishing attack infrastructure using Zphisher, nginx reverse proxy, and a custom domain. The objective was to create a convincing phishing site hosted on a local Kali machine, using a fake but realistic-looking domain name and test it against a Windows victim system on the same network.

I explored both manual DNS redirection (hosts file) and automated spoofing (Ettercap) to redirect traffic to my phishing server.

1. Setup Zphisher

Screenshot 2025-07-16 090610.png

 git clone --depth=1 <https://github.com/htr-tech/zphisher.git>

redirect to zphisher directory & run Zphisher.sh

Screenshot 2025-07-16 090720.png

sudo bash zphisher.sh 

select Microsoft login template

Screenshot 2025-07-16 090819.png

select 2 option Cloudflared and URL generate

Screenshot 2025-07-16 091002.png