Question: Now, you're ready to test an exploit. To do so , complete the following steps: Select the Commands tab. This will list folders of hundreds
Now, you're ready to test an exploit. To do so complete the following steps:
Select the "Commands" tab.
This will list folders of hundreds of exploits that can be run against the hooked browser. Note that many may not work, as they are dependent on the browser and security settings enabled.
First, you'll attempt a social engineering phishing exploit to create a fake Google login popup You can use this to capture user credentials.
To access this exploit, select "Google Phishing" within the "Social Engineering" folder, as the following image shows:Now, you're ready to test an exploit. To do so complete the following steps:
Select the "Commands" tab.
This will list folders of hundreds of exploits that can be run against the hooked browser. Note that many may not work, as they are dependent on the browser and security settings enabled.
First, you'll attempt a social engineering phishing exploit to create a fake Google login popup You can use this to capture user credentials.
To access this exploit, select "Google Phishing" within the "Social Engineering" folder, as the following image shows:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
