Guides/Info for setting up a phishing honeypot #10
-
|
Hey Corvo, Thanks for the helpful phishing archive. Any tips on setting up your own phishing honeypot? I want to create one to complement a service I'm working on but not sure where to start. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
|
Hello. Ideally, you should get some old email accounts and the messages will come naturally. If you don't have access to one, you can include an email address in data leaks that are distributed in forums, groups, etc. This helps you focus your honeypot on specific sectors. If you are trying to retrieve messages addressed to a specific company, remember to copy the structure of the addresses they use. Another suggestion is to create an email address and register it exclusively on a particular website/platform. If you receive phishing/spam, you'll know exactly where it leaked from or which website sold your data. However, it may take a few months before you receive a consistent number of messages. Try to prioritize the sources that are critical to what you are looking for. |
Beta Was this translation helpful? Give feedback.
Hello.
Ideally, you should get some old email accounts and the messages will come naturally. If you don't have access to one, you can include an email address in data leaks that are distributed in forums, groups, etc. This helps you focus your honeypot on specific sectors. If you are trying to retrieve messages addressed to a specific company, remember to copy the structure of the addresses they use. Another suggestion is to create an email address and register it exclusively on a particular website/platform. If you receive phishing/spam, you'll know exactly where it leaked from or which website sold your data.
However, it may take a few months before you receive a consistent number of me…