You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?
getaseadsss
2Â months agoStephanie0208
3Â months, 2Â weeks agoStephanie0208
3Â months, 2Â weeks agoMHafizC
3Â months, 2Â weeks agocb56e21
3Â months, 2Â weeks ago935f9c3
3Â months, 3Â weeks agoJOHNBOO
3Â months, 4Â weeks ago