Introduction
This chapter illustrates the basic cradle-to-grave process for the three basic, most
commonly used types of phishing attack. We take the perspective of the phisher
and his or her arsenal, with some comments here and there about specific
methods that you should take note of later. Ultimately, you need to consider your
attacker’s maneuv ...