blog.davidvassallo.me
Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition)
This article describes a typical penetration testing / hacking scenario : gathering as many email addresses of a target company in order to carry out more effective phishing campaigns. Note this is…