Overview
Syllabus
Intro
Transit Systems
Social Functions
Client Side Attacks
Client Side Surveillance
Answer: Kids!
Frameworks and Automation
Out of Alignment
Outside of the Lab
Business Recalibration
Traditional Phishing
How it should be Done
Phishing for Value
Preparation
Proxy Cleansing
Architecture
Tracking Results
It's Not Just About Metrics
Attacker Prep
Phishing Techniques
Live Bait Fishing (Netting)
OWA Enumeration
VPN Privileges
Phish In The Middle (PiTM)
Side Channels
Chum and Clean
The Response
You Called?
The Cleaner
Prepare for Incident Response
Prepare for ISP Abuse Alerts
Dealing with Legal Counsel
Out of Scope Shells