Advanced USB key phishing

Post Reply
kim
Posts: 183
Joined: Fri Jun 22, 2018 10:35 pm
Has thanked: 0
Been thanked: 2 times
Contact:

Advanced USB key phishing

Post by kim » Sun Jul 01, 2018 9:24 am

Say as a redteam you have the following constraints a)No internet connection b)No knowledge of target system except its OS c)USB visible content should raise a very minimum warning d) Payload execution should raise the minimum possible warning (a real innocent file must be opened).How would you successfully phish your target.well this article will show us how.some of the phishing methods include Polyglot LNK POC,Malicious Settings POC etc. So lets read the rest



Post Reply

Who is online

Users browsing this forum: No registered users and 2 guests