Description: Phishing example thorugh a Metasploit post-explotation module that configures Internet Explorer to use a PAC proxy file.
Tags: post-exploitation , proxy pac , dns spoofing , metasploit , meterpreter ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.