Introduction

What?

Recon, adapting the attack infrastructure, setting up the hooks, running the phishing campaign.

Why?

Getting in.

How?