Loading social_engineering_-_phishing.md +5 −0 Original line number Diff line number Diff line Loading @@ -59,6 +59,7 @@ The most common tool for social engineering is to use Social Engineering Toolkit ``` setoolkit ``` ## Spear phishing ## Word/excel makros Loading @@ -67,5 +68,9 @@ An explanation of how to createa malicious makro-wordfile. https://www.offensive-security.com/metasploit-unleashed/vbscript-infection-methods/ ## Embed a executable inside a PowerPoint You can embed executables inside PowerPoint presentations and then have them execute about animations. ## Reference: https://www.youtube.com/watch?v=NTdthBQYa1k No newline at end of file Loading
social_engineering_-_phishing.md +5 −0 Original line number Diff line number Diff line Loading @@ -59,6 +59,7 @@ The most common tool for social engineering is to use Social Engineering Toolkit ``` setoolkit ``` ## Spear phishing ## Word/excel makros Loading @@ -67,5 +68,9 @@ An explanation of how to createa malicious makro-wordfile. https://www.offensive-security.com/metasploit-unleashed/vbscript-infection-methods/ ## Embed a executable inside a PowerPoint You can embed executables inside PowerPoint presentations and then have them execute about animations. ## Reference: https://www.youtube.com/watch?v=NTdthBQYa1k No newline at end of file