Overview
In this lab, you will assume the role of a Vulnerability Assessment Analyst tasked with performing a phishing operation. You will generate a payload, configure a listener to catch a callback, send a phishing email, and perform some post-attack actions. This assessment is one of three, and is focused on items related to Red Team operations.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs