Aevora

Advanced Phishing

Scoping - First Phase

The first phase of scoping focuses on gathering enough detail to propose a timeline and quote. It also captures general information about your environment and engagement to support further communication. The second phase covers more specific technical details, such as target lists, test credentials, and other environment-specific requirements. Once both phases are complete, we review all information, provide a summary of work, and proceed to kick-off the engagement.

This form is submitted securely over an encrypted HTTPS connection. Your privacy is important to us. We understand that you may not be ready to answer certain questions without further discussion, or you may not yet have all the necessary details. That’s completely understandable—please complete the required fields and answer the remaining questions as best you can or as you feel comfortable.

When would you like this test to be completed?
Does this engagement have a report deadline?
Are there other services that you would be interested in bundling into this engagement?
Are there any compliance requirements?
How many users will be in scope for phishing?
Do you want Aevora to capture usernames, passwords, or other sensitive data submitted by users?
Does Aevora have authorization to access user accounts after a successful phish?
Do you want Aevora to capture cookies? This enables our operators to bypass MFA by hijacking sessions. We suggest this option if you want our team to access user accounts.
Is Aevora authorized to search for SMTP Open Relays to assist in sending spoofed emails in phishing campaigns?
Are you using any security tools to filter incoming emails for phishing indicators (e.g., malicious links, attachments, or sender spoofing)?
Please feel free to provide any other details that would be useful for our team to know going into this engagement.