Blog
Uncategorized
Social Engineering Toolkit (SET): Clone website to gain victim’s passwords
Attached.
Take all necessary and appropriate screenshots to replace old screenshots in this document. Past those new screenshots to a MS-Word file with the step numbers and descriptions.
5. Write a brief description bellow or above each screenshot for each step to make a good
report related to this lab (Additional detail descriptions are always highly encouraged).