Trials and Tribulations of Setting up a Phishing Campaign - Insight into the How
Offered By: YouTube
Course Description
Overview
Explore the challenges and intricacies of setting up a phishing campaign in this 48-minute conference talk. Delve into real-world phishing examples, learn techniques for tracking click rates, and understand the complexities of command and control systems. Navigate through the email minefield, addressing host antivirus concerns and intrusion detection methods. Discover essential tools, frameworks, and installation processes for effective phishing campaigns, including email setup, virtual machine configuration, and the use of HTA files and PHP. Gain valuable insights and key takeaways to enhance your understanding of cybersecurity threats and defensive strategies.
Syllabus
Intro
Phishing Examples
Counting Clicks
Command and Control
Email minefield
Host antivirus
Intrusion detection
Tools
Frameworks
Installation
Email
Virtual Machine
HTA Files
PHP
Key takeaways
Related Courses
Network SecurityRochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cyber Security
CEC via Swayam