Главная
Study mode:
on
1
Mentors
2
Agenda
3
Who am I
4
What is spearfishing
5
Spearfishing victims
6
Why spearfishing
7
Statistics
8
Targets
9
Email Harvesting
10
Jigsaw
11
Step 15 Filter
12
Step 16 Create Scenario
13
Step 17 Create Email
14
Phishing Email
15
Attack Vectors
16
Creating the Website
17
Changing Whois Information
18
Choosing the Payload
19
PostExploitation
20
Testing
21
User Education
22
Patching
23
User Awareness
24
Summary
Description:
Dive into advanced phishing tactics that go beyond basic user awareness in this conference talk from SkyDogCon 2012. Explore the world of spearfishing, including its targets, motivations, and statistics. Learn about email harvesting techniques, scenario creation, and the intricacies of crafting convincing phishing emails. Discover various attack vectors, website creation methods, and payload selection strategies. Gain insights into post-exploitation techniques, testing procedures, and the limitations of user education and patching. Understand the importance of comprehensive cybersecurity measures to combat sophisticated phishing attempts.

Advanced Phishing Tactics Beyond User Awareness

Add to list
0:00 / 0:00