Phishing Server
We will also use a specific server for phishing activities, so if it gets blocked, the rest of the infrastructure remains the same.
From this server we will execute the different techniques describe in "Social Engeniering > Phishing" section, like sending emails or setting up a fraudulent website.
Last updated