1 min read

An example of a social engineering attack using Kali Linux – use a credential harvester to gather the victim’s credentials. Redirect your victim to a spoofed website and then collect the login credentials. Part of Kali Linux – Backtrack Evolved: Assuring Security by Penetration Testing. For the full course visit: https://www.packtpub.com/networking-and-servers/kali-linux-backtrack-evolved-assuring-security-penetration-testing-video


LEAVE A REPLY

Please enter your comment!
Please enter your name here