Permanent link: [Article]-The 5 Secrets to Phishing Success
These days, it’s hard to perform a penetration test without attempting some sort of online social engineering, and most often, this takes the format of some type of phishing attack (whether targeted or across a wide user base).
While we spend epic amounts of time getting our exploits and payloads perfect (even if we’re using SET), far too often we see testers using stock emails or variants of canned emails that they’ve been taught to use without thinking about the real keys to getting their emails read and acted upon.
These are my five most-often overlooked secrets to making sure that your email phishing works...
Let him know what you think, and, if it helped, tell us how.