This project documents a phishing simulation carried out in a controlled environment using Kali Linux and Zphisher. The goal was to understand how phishing attacks work, how credentials are captured, and how browser security reacts.
- Kali Linux (VirtualBox)
- Zphisher (GitHub Toolkit)
- Cloudflare Tunneling
- Simulated LinkedIn and Facebook phishing pages.
- LinkedIn was blocked by the browser.
- Facebook page loaded and captured dummy credentials.
- Only Cloudflare-generated link worked.
A full PDF report is included with step-by-step execution, screenshots, issues faced, and ethical considerations.
For cybersecurity learning and ethical hacking awareness. No real targets were involved.