April 2017
Intermediate to advanced
350 pages
8h 35m
English
In this chapter, we learnt about credential harvesting. We also saw how phishing campaigns can be developed and run to capture usernames and passwords from an insecure login page.
In Chapter 7, Advanced Network Attacks, we will learn about the man in the middle framework.