To acquire valid credentials through a social engineering campaign, the tester needs (1) a way to deliver controlled phishing messages and track engagement, and (2) a method to capture authentication material when targets attempt to log in. Gophish is a phishing campaign framework used to send realistic emails, manage templates and landing pages, and collect campaign metrics (opens, clicks, submitted data). This directly supports the operational side of a sanctioned phishing assessment described in PenTest+ social engineering activities.
Evilginx aligns with credential acquisition by acting as a reverse-proxy phishing technique that relays “real” authentication traffic to the legitimate site while capturing credentials and related session artifacts during the login flow. This is especially relevant in modern environments where testers may need to evaluate the effectiveness of protections like MFA and conditional access controls.
Other options are supportive but not the most direct for credential capture: theHarvester/Maltego help identify or organize targets, Shodan focuses on exposed systems, and TruffleHog searches for leaked secrets in repositories rather than conducting a social engineering campaign.
A. Deploy a command-and-control server with custom profiles to facilitate execution.
B. Use Python 3 with added testing libraries and script the relevant action to test.
C. Utilize the PowerShell PowerView tool with custom scripting additions based on test results.
D. Implement Atomic Red Team to chain critical TTPs and perform the test.
Answer: D
To automate adversarial activities in a repeatable, measurable way, PenTest+ emphasizes using frameworks that map directly to attacker behaviors (TTPs) and support consistent execution across environments. Atomic Red Team is designed specifically for this purpose: it provides standardized, modular tests aligned to common adversary techniques and allows defenders and testers to validate detection and response capabilities by repeatedly executing those behaviors in a controlled manner. Starting with Atomic Red Team helps translate lessons learned from penetration tests into an ongoing validation program by selecting only the techniques relevant to the organization’s threat model and then chaining them into realistic sequences. This supports continuous security testing, regression checks after changes, and objective measurement of control effectiveness.
By contrast, deploying a full command-and-control platform first increases operational complexity and risk without ensuring the activities are standardized or easily repeatable. Writing custom Python scripts or extending PowerView can work, but those approaches typically require more bespoke development and do not inherently provide a structured library of TTP tests that can be consistently run and reported. Atomic Red Team is the best “first” step for automation.