Главная
Study mode:
on
1
Introduction
2
Overview
3
Background
4
Reconnaissance
5
Better Tools
6
Generic Portals
7
Phishing Emails
8
Payload Delivery
9
Code Snippet
10
Empire
11
Kerberos
12
Metasploit
13
Mimicats
14
Empire Setup
15
Network Enumeration
16
Summary
Description:
Explore a technical demonstration of an email phishing attack in this 44-minute conference talk from BSides Philly 2016. Delve into the attacker's perspective as Zac Davis guides you through the various stages of a sophisticated cyber attack. Learn about reconnaissance techniques, better tools for exploitation, and the creation of generic portals and phishing emails. Discover payload delivery methods, including code snippets and Empire setup. Gain insights into network enumeration, Kerberos exploitation, and the use of tools like Metasploit and Mimicats. Understand the intricacies of cyber threats and enhance your cybersecurity knowledge with this comprehensive overview of modern attack methodologies.

Attackers Perspective - A Technical Demonstration of an Email Phishing Attack

Add to list
0:00 / 0:00