TagsPhishingPhishing a company through a 7-Zip misconfigurationReading about phishing can sometimes feel tedious, as many articles simply rehash the same old scenarios and prevention strategies without diving into technical details or offering anything fresh. But don't worry, we've got you covered!Author(s)Kelyan YesilPublished at19 Jan 2023Updated at13 Apr 2023How to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at09 Jun 2023
Phishing a company through a 7-Zip misconfigurationReading about phishing can sometimes feel tedious, as many articles simply rehash the same old scenarios and prevention strategies without diving into technical details or offering anything fresh. But don't worry, we've got you covered!Author(s)Kelyan YesilPublished at19 Jan 2023Updated at13 Apr 2023
How to simulate phishing attacks with the HTTP Request LoggerAs a penetration tester or a Red Team security consultant, you probably deal with lots of challenges when you want to simulate phishing attacks using social engineering techniques. Because our team’s goal is to make your job easier by providing the right tools, we’ve put together a hands-on guide you can use straight away!Author(s)Razvan IonescuPublished at20 Feb 2020Updated at09 Jun 2023