How to do it...

The spear-phishing module has three different attack vectors at our disposal:

  1. Let's analyze first. Passing the first option will start the mass email attack. The attack vector starts by selecting a payload. You can select any vulnerability from the list of available Metasploit exploit modules:
  1. Then, we will be prompted to select a payload and specify the IP address or URL and the port for the listener.
  2. In the next few steps, we will be starting the sendmail server, setting a template for a malicious file format, and selecting ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.