Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Z-PHISHER

Siddhant Singhal
2021PUSCEBCYX09766
BCA (Cyber Security)
INTRODUCTION

Z-phisher, a powerful and highly effective phishing tool that can


be used to carry out phishing attacks on various platforms. Z-
phisher is an open-source, easy-to-use phishing tool that enables
users to create and execute highly convincing phishing
campaigns against unsuspecting targets.

20XX Pitch deck title 2


TABLE OF CONTENT

1. What is Z-Phisher?
2. What is Phishing?
3. Uses and Features
4. Installation
5. Alternatives
6. Conclusion

20XX Pitch deck title 3


WHAT IS Z-PHISHER?

• It is a powerful and effective phishing tool.


• Z-phisher is open-source and easy-to-use, allowing users to create convincing phishing
campaigns.
• The tool is designed to test the vulnerability of computer networks, websites, and other
digital assets.
• Z-phisher can be used to educate individuals about the dangers of phishing and how to
protect themselves against it.
• Suitable for security professionals, researchers, and anyone interested in cyber attacks
and defense.

20XX Pitch deck title 4


WHAT IS PHISHING?
Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers.

It occurs when an attacker, masquerading as a trusted entity, dupes a victim


into opening an email, instant message, or text message.

The recipient is then tricked into clicking a malicious link, which can lead to
the installation of malware, the freezing of the system as part of
a ransomware attack or the revealing of sensitive information.

20XX Pitch deck title 5


USES AND FEATURES
• It is open-source tool.

• It is a tool of Kali Linux.

• It is used in Phishing attacks.

• It is a very simple and easy tool.

• It is a very simple and easy tool. Zphisher is written in bash


language.

• It is a lightweight tool. This does not take extra space.

• It is written in bash language.

• It creates phishing pages for more than 30 websites.

20XX Pitch deck title 6


INSTALLATION
1. Open Linux Terminal.
2. Run the following Commands:
$ git clone git://github.com/htr-tech/zphisher.git
$ cd zphisher
$ bash zphisher.sh

20XX Pitch deck title 7


ALTERNATIVES

Set ToolKit King Phisher BlackEye

20XX Pitch deck title 8


CONCLUSION

Z-phisher can also be used for legitimate purposes, such as


testing and improving the security of computer networks and
web applications.
However, it is important to use such tools responsibly and in
accordance with ethical standards to avoid causing harm or
violating laws and regulations.
Overall, Z-phisher is a valuable tool for security professionals
and researchers, but it should be used with caution and a
deep understanding of the potential risks and consequences.

20XX Pitch deck title 9


REFERENCE

• Zphisher - Automated Phishing Tool in Kali Linux – GeeksforGeeks


• htr-tech/zphisher: (github.com)
• ZPhisher : (kalilinuxtutorials.com)

20XX Pitch deck title 10


THANK YOU

You might also like