This is a dedicated watch page for a single video.
Khan, a white-hat hacker, was assigned to conduct a penetration test for the company "Test" During the information-gathering phase, he discovered an employee's publicly available email address. Khan then crafted an email, altering the sender address to appear as "ceo@test.com." In the message, he urged the employee to quickly open a "link with the report" and review it. The employee complied, clicking the link and unknowingly infecting their computer. As a result, Khan successfully gained access to the corporate network and completed the penetration test. What type of attack did Khan utilize?