Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Notifications
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Risk Score
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
          • API Routes
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Time Required
  • Installing with Docker
  • Installing with VMware or Virtualbox
  • VMware
  • VirtualBox

Was this helpful?

  1. Guides
  2. Installing Lucy

Installing Lucy

PreviousNetwork CommunicationNextPost Installation

Last updated 4 months ago

Was this helpful?

Time Required

Installation takes approximately 30-60 minutes, depending on your internet speed.


Installing with Docker

Install the host OS, see our list of supported operating systems .

Download the installation file:

For Ubuntu 20.04:

wget https://download.phishing-server.com/dl/lucy-latest/install-20.04.sh

For Ubuntu 22.04:

wget https://download.phishing-server.com/dl/lucy-latest/install-22.04.sh
Overview of install_script.sh

This script is a comprehensive Bash installation and management script for deploying a Lucy server, which uses Docker containers.

High-Level Overview

  1. Pre-Installation Checks:

    • Verifies system prerequisites like kernel version, system architecture, and necessary ports availability. The script uses set -e to exit on any error.

  2. Docker Installation and Configuration:

    • Checks for existing Docker installation and installs it if absent.

    • Handles specific configurations like storage types and network ports.

    • Manages and configures Docker containers specifically for Lucy, setting up necessary volumes and ports.

  3. Lucy Installation:

    • Checks for sufficient disk space.

    • Pulls the Lucy Docker image and runs it with necessary parameters.

    • Configures system settings within the Docker container to integrate Lucy effectively.

Notes

  • This script is highly specific to systems compatible with Docker and expects certain Linux kernel versions and architectures.

  • It provides extensive error handling and user prompts to ensure that installations and changes are made explicitly with user consent and awareness.

Make the file executable:

sudo chmod +x install.sh

Execute the file:

sudo ./install.sh

Installation completed successfully:

Verify if your Lucy container is running:

docker ps

Installing with VMware or Virtualbox

We supply preconfigured virtual images for VMware and VirtualBox. Simply download the image and deploy it in your preferred solution.

VMware

VirtualBox

Be sure to set the network mode to "Bridged" for all of the above VM solutions.

ESXi: OVF:

https://download.phishing-server.com/dl/phishing-4.14/esxi.ova
https://download.phishing-server.com/dl/lucy-latest/esxi_ovf.zip
https://download.phishing-server.com/dl/lucy-latest/virtualbox.zip
here