LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Landing Page Templates Actions
  • How to Create a New Landing Page Template
  • How to Edit a Landing Page Template
  • How to Preview a Landing Page
  • How to Clone a Landing Page
  • How to Delete a Landing Page
  • Utilizing Merge Tags in Landing Page Templates
  • Video Tutorial

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Quishing Simulator
  4. Manage Quishing Scenarios

Quishing Landing Page Templates

The Quishing Simulator > Quishing Scenarios > Landing Page Templates page has ready-to-use landing page designs. You can use these pages as they are or customize them for your quishing campaigns. Landing pages take users to a specific webpage, which can either give them information about the phishing campaign or ask for their credentials.

The components of the Landing Page Templates page are explained below.

Template name

Name of the landing page template

Method

The quishing technique employed

Data Submit = Used to detect target users who submit data on the landing page Click-Only = Used to detect target users who click the unknown link

Language

List the landing page templates in selected languages.

Tags

Tags can be added to the email template to enable viewing using related tag lists.

Difficulty

Created By

System: Standard phishing landing page templates are provided with the module.

Custom: Quishing landing page templates created or customized by users.

Stop bots to prevent false clicks

The bots prevention feature is enabled or disabled for the landing page.

Date Created

The date and time the landing page template was created

Landing Page Templates Actions

This section explains how to create, edit, preview, clone, or delete a landing page.

How to Create a New Landing Page Template

Follow the steps below to add a new landing page that you can use in a new or existing quishing scenario:

  1. Click the +New button in the upper right corner of the Quishing Simulator > Quishing Scenarios > Landing Page Templates page.

  2. Complete the required fields on the first page, then click Next.

  3. On the Page Settings page, provide the QR Code Link: the URL to be used to redirect users to this page after scanning the QR code.

  4. Under the QR Code Link field, you can enable the "Stop bots to prevent false clicks" feature to detect and stop bot activity automatically to prevent false clicks, ensuring genuine traffic to your quishing campaign.

  5. Click Edit to make any customization on the landing page or Save to complete the process.

How to Edit a Landing Page Template

Click on the three dots '⋮' button in the Actions option on the far right of the relevant page, and then click the Edit button.

How to Preview a Landing Page

Click on the three dots '⋮' button in the Actions option on the far right of the relevant page, and then click the Preview button.

How to Clone a Landing Page

Click on the three dots '⋮' button in the Actions option on the far right of the relevant page, and then click the Duplicate button.

How to Delete a Landing Page

Click on the three dots '⋮' button in the Actions option on the far right of the relevant page, and then click the Delete button.

Utilizing Merge Tags in Landing Page Templates

Here's a list of merge tags to help you make your landing pages more personal. Adding these tags can make your quishing campaign more tailored to the recipient.

Merge Tag
Description

Full Name

Inserts the target user's first and last name.

First Name

Inserts the target user's first name.

Last Name

Inserts the target user's last name.

Email

Inserts the target user's email address.

Company Name

Displays your organization's name, sourced from the company profile.

Date Sent

Inserts the date when the campaign is launched.

Current Date

Inserts the current date when the campaign is launched.

Current Date Plus 10 Days

Inserts a date that is 10 days after the campaign's launch date.

Current Date Minus 10 Days

Inserts a date that is 10 days before the campaign's launch date.

Random Number One Digit

Generates and inserts a random one-digit number.

Random Number Two Digit

Generates and inserts a random two-digit number.

Random Number Three Digit

Generates and inserts a random three-digit number.

Video Tutorial

Landing pages direct the user to a specific page and can be used for a variety of purposes, such as requesting login credentials or other sensitive information. This tutorial will walk through the steps of creating/editing a landing page.

PreviousQuishing TemplatesNextQuishing Campaign Manager

Last updated 1 month ago

Was this helpful?

The level of difficulty to recognize a phishing attempt (Easy, Medium, Hard). Please to see how the difficulty level is determined.

💫
click here