Raids
Raids are the core attack campaigns in Hook. A raid orchestrates the entire phishing operation, from email delivery to credential capture. Hook supports two types of raids: Forward Proxy (static content) and Reverse Proxy (MITM attacks).Overview
A raid combines:- Target List - Who to attack
- Lure - Email template
- Portal Flow - Landing pages or target site
- Mail Sender - Email delivery configuration
- Corsair - Worker to execute the attack
Raid Types
Forward Proxy Raids
Forward proxy raids serve static phishing content:- Serve cloned login pages
- Capture credentials via form submission
- Redirect to legitimate site after capture
- Support for multi-page flows (portal flows)
Reverse Proxy Raids (MITM)
Reverse proxy raids perform man-in-the-middle attacks:- Proxy all traffic to the real target site
- Intercept and capture credentials in transit
- Capture session cookies for hijacking
- Maintain authenticated sessions
- Bypass MFA by capturing session tokens
Creating a Raid
Prerequisites
Before creating a raid, you need:- A Client and Tag for organization
- A Target List with targets
- A Lure (email template)
- A Mail Sender configured
- A Corsair deployed
- For reverse proxy: A Target Site configuration
Create Raid Request
Raid Initialization
When a raid is created, Hook:- Inserts raid into database
- Sends to Corsair over mesh network
- Creates Deckhand worker on Corsair
- Fetches lure and creates mail items
- Schedules emails based on start/end times
Reverse Proxy Session Handling
Session Tracking
Each victim gets a unique session:Credential Capture
The reverse proxy intercepts login requests:Session Hijacking
After authentication, sessions can be hijacked:Raid Lifecycle Events
Email Opens
Tracked via tracking pixels:Link Clicks
Tracked when victims visit the phishing page:Managing Raids
List Raids
Get Raid Details
Update Raid
Next Steps
- Session Capture - Captured data details
- Lures & Emails - Email templates
- Clients, Tags, Targets - Target management

