Covert red team phishing
I wrote a post about how to perform a red team phishing campaign, including a reconnaissance and AITM sesssion capture. I hope you enjoy it. It does not cover creating a m365 proxy config, I will leave that as a exercise to the reader 🙂 submitted by /u/hackeronni [link] [comments]Technical Information Security Content & DiscussionRead More