Intel-driven
Opsec
Preparation
Weaponisation
Password attacks
Phishing
Enumeration
Escalation
Persistence
Lateral movement and pivoting
Data exfiltration
Recon, adapting the attack infrastructure, setting up the hooks, running the phishing campaign.
Getting in.
Phishing overview
Mail delivery
Steal access info with fake login page
Webpage with BeEF hook
Use analytics to lure a target
Fake prompts everywhere
Pharming overview
Credential stuffing