Step 5 – result

Two minutes after we hung up, we noticed that the tool had been downloaded using the link in the email. Another minute later, we received a connection from the now-compromised workstation.

Just to measure the awareness of the target employees, we launched three more attacks. Out of a total of four emails sent, we managed to compromise three workstations.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.15.99