You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?
Mdean
Highly Voted 3 years agolovalim
2 years, 6 months agoJude2021
Highly Voted 2 years, 8 months agoostorgaf
Most Recent 7 months, 3 weeks agoMK123One
9 months, 3 weeks agoMuli_70
11 months, 3 weeks agoyasso2023
1 year agopiccolopersiano
1 year agoSri0908
1 year, 1 month agomdmdmd
1 year, 2 months agoVOAKDO
1 year, 2 months agosnemmani
1 year, 3 months agoerpiri
1 year, 4 months agokiki533
1 year, 5 months agoDaniel8660
1 year, 6 months agoC1ph3rSt0rm
1 year, 6 months agoC1ph3rSt0rm
1 year, 6 months agosn30
1 year, 7 months agotinkerer
1 year, 7 months ago