This book is an introduction for the reader in the world of Phishing attacks. The book focuses on the different kinds of Phishing attacks and provides an overview of some of the common open source tools that can be used to execute Phishing campaigns. Red teams, pentesters, attackers, etc. all use Phishing techniques to compromise a user’s machine.
It is necessary for Red teams and pentesters to understand the various payload delivery mechanisms used by current threat profiles. The book then delves into the common Phishing payload delivery mechanisms used by current threat profiles. It also introduces some new and uncommon payload delivery techniques that the author has used in the past to bypass and get through email filters as well as end-point detection systems
*Disclaimer: As an Amazon Associate we earn from qualifying purchases.