Category: Framework
Posts related to one or more of the Phishing Attack Framework components.
-
Understanding UTM Parameters
A crucial yet often overlooked aspect of phishing campaigns is the use of UTM (Urchin Tracking Module) parameters. This blog post will delve into what…
-
What is a Reverse TCP Shell?
-
Pick Your Poison
In this article, we will consider various Payloads and Payload Delivery mechanisms. Although we won’t get into the specifics of each (yet), we will provide…
-
Credential Harvesting Made Easy
Here at P&C, we believe the lowest-energy means to accomplish the task is often the best. In this article, we will set-up a credential trap…
-
What are Email Headers?
Emails have become an integral part of our personal and professional lives. While we usually focus on the content of an email, there’s a wealth…
-
Where Do Email Lists Come From?
Email lists used for spam and phishing campaigns are sourced from a variety of locations, with each source having its unique method of acquisition and…
-
Phish or Feast? Reporting on Your Phishing Campaign Results
-
Fishing for Insights: Analyzing Phishing Campaign Outcomes
-
Hook, Line, and Insights: Reporting on Phishing Campaigns
-
Phishing Expedition Report: What the Bait Reveals
-
Phishing Adventures Unveiled: Reporting and Analysis
-
Phishy Business: Unmasking the Results of Phishing Campaigns
-
Campaign Chronicles: Adventures of Cyber Strategists
-
Campaign Command Central: Where Cyber Masterminds Plot
-
Campaign Management for Dummies (Not Hackers): A Beginner’s Guide
-
Project Management or Cyber Campaign? Spot the Differences
-
From Campaign Trail to Cyber Trail: Managing Attacks with Flair
-
Cyber Campaigns: Planning, Execution, and Pizza?
-
Evasion vs. Detection: The Battle of Wits