Request Demo
Phishing mails
Phishing mails
Passwords
Passwords
Binary code
Binary code
(Spear) phishing
(Spear) phishing

Phishing only works if you take the bait

The first step has been taken. Now you're going to learn the ins and outs of various (spear) phishing techniques. You are now stepping into the role of perpetrator yourself. Hopefully you are ready to betray your colleagues...

Phishing mails

Hidden URLs, suspicious attachments, spelling mistakes, weird links and asking for your personal information. Phishing is perhaps the best-known form of cybercrime.

  • Recognize phishing emails and fake WhatsApp messages.
  • Distinguish between phishing and secure emails/messages.
  • Answer the question: why is it phishing?
  • Customization through a personalized mail environment set up for you and your business.

Passwords

What are the most common passwords, which passwords are the most difficult to crack and how easy is it for a hacker to crack a password?

  • Utility and effectiveness of passwords.
  • Can you manage to quickly crack a password yourself?

Binary code

Practice makes perfect. Time to put your skills into practice. Prepare malware to disrupt your company's network. Translate the binary code to see what letters the numbers consist of and complete the code further.

  • Adjust the source file to take up bandwidth.
  • Complete the code in the source file by translating the binary code.
  • Plant the code back to disrupt your company's network.

Spearphishing

Ready to really betray your colleagues? Good, because now you can't go back. You're going to use what you've learned to create a spearphishing email to frame your colleagues. Do you know how to choose the right options to make the phishing email as realistic as possible?

  • Complete the e-mail with the correct information.
  • Choose the right options.
  • Customization by sending a personalized phishing email to your colleagues.

Watch the levels

PhantomX's dark plan is unfolding. Are you ready to spread malware?

Your wake up call for cyber awareness

We promise that the button below will lead to "request a demo." However, in the future, you will think 3 times before clicking just any button.

Request a free demo now
Outing requests