Description: normally if a system is exploited remotely, a hacker wants to get a shell of remote system, but some times he does not need any shell,instead perform phishing attacks in order to obtain username and passwords from the system. this can be done by credential harvester attack method.
In this type of attack, a website is cloned first, and when the victim enters in the user credentials, the usernames and passwords are captured by attacker and then the victim is redirected back to the legitimate site.
this video is all about credential harvester attack method.
Tags: set , credential_harvester_attack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
set includes this attack and also many more. thanks to set developers for developing such a great tool.
I thing SET toolkit is best for all the phishing work.