ZPhishier – Social Media Phishing Simulaton
Summary ZPhishier is an educational phishing-simulation project built with ZPhisher on Kali Linux, running in a local VM environment. It automates the creation of cloned social-media login pages, demonstrating how easily credentials can be harvested from unsuspecting users. This documentation covers objectives, setup, execution details, results, and recommended best practices for security awareness and prevention.
Objective
- To illustrate phishing mechanics ethically for security awareness and training.
- To demonstrate capture of credentials via cloned login pages.
Scope
- Simulation only (no real targets).
- Local-only deployment (VM).
- Focused on social-media site templates.
Legal & Ethical Disclaimer
Important: This tool is strictly for educational and awareness purposes. Unauthorized phishing—against real users or networks—is illegal and unethical. Always obtain explicit permission before any penetration testing or phishing simulations IRJMETS.
Attack Overview
-Phishing Type
Cloning of popular social media login pages (e.g., Facebook, Instagram) to harvest credentials.
-Delivery Method
Links are generated and tested locally; no external distribution in this demo.
-Target Audience
General public (demonstration only on the attacker’s own machine).
Tools & Environment
- ZPhisher: automated open-source phishing tool with 30+ templates.
- Operating System: Kali Linux (inside a virtual machine).
- Environment: Local VM (no public hosting).
Setup & Configuration
- VM Preparation
- Spin up a Kali Linux VM (VirtualBox/VMware).
- Ensure Internet access within VM for installing dependencies.
- Install ZPhisher
- Launch ZPhisher
cd zphisher
bash ./zphisher.sh


Execution Steps
Generate Phishing Link
- ZPhisher displays a URL (e.g., http://localhost:8080/facebook).
Simulate User Interaction
- Open the link in a browser tab.
- Enter any credentials (email/username + password).
Credential Capture
- ZPhisher logs credentials in the terminal and saves them to logs/ directory.
Results & Analysis
- Captured Data
- Plaintext usernames/passwords printed in terminal and stored on disk.
- Security Triggers
- No automated detection in this local setup (real-world defenses like anti-phish filters would block such URLs).
Mitigation & Recommendations
“Do not click on suspicious, catchy messages from unknown sources.”
- User Training
- Regular phishing awareness programs with simulated tests CISACybeReady.
- Teach employees to verify links and check sender domains before interacting Microsoft Support.
- Incident Response
- Establish clear reporting channels for suspected phishing (e.g., “Report Phish” button).
- Conduct follow-up training for any user who clicks or submits credentials