Initial Access with King Phisher
Offered By: Pluralsight
Course Description
Overview
King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.
Through the use of phishing techniques, you'll learn the skills and understanding to further your red teaming objectives towards initial access. In this course, Initial Access with King Phisher, you’ll see how to utilize King Phisher to execute a phishing attack in a red team environment. First, you’ll demonstrate your ability to identify a victim and enumerate DNS to craft a successful phishing campaign. Next, you’ll apply a spearphishing technique to target a victim. Finally, you’ll simulate harvesting victim credentials by crafting a landing page to use in the attack. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques. Phishing: Spearphishing Link-T1566.002 & Valid Accounts-T1078 using King Phisher.
Through the use of phishing techniques, you'll learn the skills and understanding to further your red teaming objectives towards initial access. In this course, Initial Access with King Phisher, you’ll see how to utilize King Phisher to execute a phishing attack in a red team environment. First, you’ll demonstrate your ability to identify a victim and enumerate DNS to craft a successful phishing campaign. Next, you’ll apply a spearphishing technique to target a victim. Finally, you’ll simulate harvesting victim credentials by crafting a landing page to use in the attack. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques. Phishing: Spearphishing Link-T1566.002 & Valid Accounts-T1078 using King Phisher.
Taught by
Jeff Stein
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network