You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?
Mdean
Highly Voted 3 years, 3 months agolovalim
2 years, 9 months agoJude2021
Highly Voted 2 years, 11 months agoostorgaf
Most Recent 10 months, 2 weeks agoMK123One
1 year agoMuli_70
1 year, 2 months agoyasso2023
1 year, 3 months agopiccolopersiano
1 year, 3 months agoSri0908
1 year, 3 months agomdmdmd
1 year, 5 months agoVOAKDO
1 year, 5 months agosnemmani
1 year, 6 months agoerpiri
1 year, 7 months agokiki533
1 year, 8 months agoDaniel8660
1 year, 9 months agoC1ph3rSt0rm
1 year, 9 months agoC1ph3rSt0rm
1 year, 9 months agosn30
1 year, 10 months agotinkerer
1 year, 10 months ago