Skip to content

Phishing

Stentor includes integrated phishing infrastructure for initial access operations. The platform handles the complete email campaign lifecycle -- from template design and SMTP configuration through delivery, tracking, and credential capture. Site cloning and drive-by download pages extend the phishing toolkit for credential harvesting and payload delivery.

sequenceDiagram
    participant Operator
    participant Backend API
    participant Relay (SMTP)
    participant Target Inbox
    participant Target
    participant Relay (Tracking)
    participant Relay (Landing)

    Operator->>Backend API: Create campaign + import targets
    Backend API->>Relay (SMTP): Send emails via WebSocket command
    Relay (SMTP)->>Target Inbox: Deliver phishing email
    Target->>Relay (Tracking): Open email (tracking pixel)
    Target->>Relay (Tracking): Click link (redirect to landing page)
    Target->>Relay (Landing): Submit credentials
    Relay (Landing)->>Backend API: Report events via WebSocket
    Backend API->>Operator: Update campaign metrics

In This Section

  • Campaign Management -- Create campaigns, configure SMTP, import targets, design emails, clone sites, track engagement metrics.