How I Got Network Creds Without Even Asking: A Social Engineering Case Study Jen Fox
On a professional pen testing engagement,why is one call or phish pretext selected over another? Why does it work (or not)? This case study describes how an SE pen testing engagement used a combination of exploits – phishing, vishing, and a spoofed site to successfully gain network credentials without even asking for them. Learn why … Read more