Preparing a phishing attack for my own fiat mine πŸ€£πŸ˜‡, admins, do you do fake attacks in your companies? I usually prepare one annually and then we prepare trainings to those who have fallen into the trap πŸ˜…πŸ€“

Reply to this note

Please Login to reply.

Discussion

So YOU’RE that guy!

πŸ˜‚πŸ˜‚πŸ˜‚ Yeah πŸ€“πŸ˜‡πŸ˜Ž

( nice to meet you nostr:npub1ultgzumnrm4jty88f2j4d7fskd3px2ac7lasmjn654xz860u6ups08qspk )

🀝

Good practice... if use too much... the company is not going to run smoothly, read the source code of an email just to check for anomalies :S ... need to check via another channel (message) like "You sent that email?". I am pro paranoid guys... but companies don't work well with that kind of people.

Of course, you have to find a balance πŸ˜‚, but the target of these attacks is people with little knowledge, to begin with, they do not access by https, that should make them suspicious. I also commit some spelling mistakes deliberately, apart from the fact that the domain is not the same!

I used to always open them anyway for the lulz

I log if they open the email, if they open the URL if they type in the fields and finally if they hit submit. i detect that it is someone who is teasing me when they type the username "fuckyou" or "eat my balls" πŸ˜‚πŸ˜‚πŸ˜‚

Yep that's me lol

⚑️