Skip to content

Semi-automated deployment of Gophish on AWS with Cloudformation

Notifications You must be signed in to change notification settings

hotpheex/gophish-cloudformation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Gophish Cloudformation Deployment

Architecture

  • A Route 53 Hosted Zone is created for each phishing domain
  • An Amazon Certificate Manager SSL cert is provisioned and verified for each Domain using Route 53
  • DNS records point to an Application Load Balancer with all ACM Certs attached
  • The ALB forwards traffic to an Autoscaling group with one EC2 instance running Gophish

Requirements

Deployment Steps

  1. Clone this repo

  2. Edit config.yaml with your preferences

  3. Ensure AWS CLI is configured and authenticated

  4. Deploy hosted zones for each phishing domain:

./manage.sh update_zones
  1. Update NS records for each domain to the nameservers listed in script output Example:
Domain: phish.com
        ns-219.awsdns-27.com
        ns-1365.awsdns-42.org
        ns-797.awsdns-35.net
        ns-1828.awsdns-36.co.uk
  1. Once the records have propogated, build and deploy the Gophish stack:
./manage.sh update_platform

About

Semi-automated deployment of Gophish on AWS with Cloudformation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published