This is a dedicated watch page for a single video.
Hasan, a security specialist, is conducting a penetration test in his organization. He discovers email addresses of two employees from public sources and prepares a client-side backdoor to send to them via email. Which stage of the cyber kill chain is Hasan performing?