Question: Now, you're ready to test an exploit. To do so , complete the following steps: Select the Commands tab. This will list folders of hundreds

Now, you're ready to test an exploit. To do so, complete the following steps:
Select the "Commands" tab.
This will list folders of hundreds of exploits that can be run against the hooked browser. Note that many may not work, as they are dependent on the browser and security settings enabled.
First, you'll attempt a social engineering phishing exploit to create a fake Google login pop-up. You can use this to capture user credentials.
To access this exploit, select "Google Phishing" within the "Social Engineering" folder, as the following image shows:Now, you're ready to test an exploit. To do so, complete the following steps:
Select the "Commands" tab.
This will list folders of hundreds of exploits that can be run against the hooked browser. Note that many may not work, as they are dependent on the browser and security settings enabled.
First, you'll attempt a social engineering phishing exploit to create a fake Google login pop-up. You can use this to capture user credentials.
To access this exploit, select "Google Phishing" within the "Social Engineering" folder, as the following image shows:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!