October 2018
Intermediate to advanced
404 pages
8h 50m
English
The Spear-Phishing Attack Vectors menu has four options:
Since we are going to set up a persistent threat that lets us stay in command of the victim's machine, and have to overcome a user's possible reluctance to double-click an attachment, we have to create an irresistible spear-phishing mail piece. To do this properly, it is important to have done effective reconnaissance ahead of time.
Company address books and calendars are useful for creating the urgency needed to get an email opened. Just like with marketing by email, either legitimate or spammy, a spear-phishing ...