User Tools

Site Tools


create_a_phishing_campaign_with_malware_simulations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
create_a_phishing_campaign_with_malware_simulations [2019/03/04 10:09]
lucy
create_a_phishing_campaign_with_malware_simulations [2019/04/01 20:26] (current)
lucy
Line 170: Line 170:
 **Note**: The current edition of LUCY will include tools that access files on shares and upload them to the campaign or access the email client via MAPI. These features have restricted configuration options in the community edition (like maximum number of files that can be uploaded, etc.) the same goes for the number of screenshots or length of videos. Only the Commercial Editions have no limitations. You can upload your own custom payload. But keep in mind that reverse channels to LUCY won’t work; only attachments from LUCY are compiled in Real Time with certain settings (IP, Domain Name, URL etc.). **Note**: The current edition of LUCY will include tools that access files on shares and upload them to the campaign or access the email client via MAPI. These features have restricted configuration options in the community edition (like maximum number of files that can be uploaded, etc.) the same goes for the number of screenshots or length of videos. Only the Commercial Editions have no limitations. You can upload your own custom payload. But keep in mind that reverse channels to LUCY won’t work; only attachments from LUCY are compiled in Real Time with certain settings (IP, Domain Name, URL etc.).
  
- 
-**File Downloads (mail/web) are Blocked - Is There a Workaround?​** 
- 
-Yes - We have a tool which allows you to compile any executable into a Word document and convert it into a Macro. Depending on Security Settings, the user might get a security warning when opening of the Word document. The tool is only available for Commercial Clients on request. 
- 
-{{ 118.jpg?600 }} 
create_a_phishing_campaign_with_malware_simulations.txt · Last modified: 2019/04/01 20:26 by lucy