A penetration tester discovered that a client uses cloud mail as the company's email system. During the penetration test, the tester set up a fake cloud mail login page and sent all company employees an email that stated their inboxes were full and directed them to the fake login page to remedy the issue. Which of the following BEST describes this attack?
pepgua
5 months agonickwen007
1 year, 8 months agonickwen007
1 year, 8 months ago[Removed]
1 year, 8 months agocy_analyst
1 year, 8 months ago[Removed]
1 year, 8 months ago[Removed]
1 year, 8 months ago