Overview
In this lab, you will assume the role of a Vulnerability Assessment Analyst tasked with performing a phishing operation. You will generate a payload, configure a listener to catch a callback, send a phishing email, and perform some post-attack actions. This assessment is one of three, and is focused on items related to Red Team operations.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468eef1024706067094ee62_Red_Team.png)
Learning Partner
![CYBRScore](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64744bb1dac63cc4698c7781_browse-cybrscore-logo.png)
CYBRScore
Cybersecurity Technical Hands-on Labs