A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Phishing: Going from Recon to Credentials - Adam Compton, Eric Gershman BSides Las Vegas 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Phishing: Going from Recon to Credentials
Adam Compton, Eric Gershman

This presentation will quickly explore some of the common phishing attack tools and techniques. Additionally, there will be a demo of a new tool which can assist penetration testers in quickly deploying phishing exercises in minimal time. The tool can automatically search for potential targets, deploy multiple phishing websites, craft/send phishing emails, record the results, and generate a basic report.

Back to Las Vegas 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast