Toolkit
  • Password Guesser
    Attempt to log in by trying lots of different passwords from a database
  • Web Scanner
    Scan a public web server for vulnerabilities
  • Device Scanner
    Scan a server, printer or IoT device for vulnerabilities
  • WiFi Scanner
    Look for visible wifi networks
  • Network Mapper
    Scan a network to see what devices are on it

Phishing Email Sent

Your email might sit in someone's inbox for a few hours before they open it, so you get up from your desk and find something to much on. All this talk of donuts is making you crave one. No donuts here sadly.

When you get back to your desk, you get a notification: It worked!

Phishing Email Opened Congratulations! You found a hole in their security (Phishing Email Opened)

Someone opened your document (fail number 1). Their computer allowed the malware to run (fail number 2). The computer was not fully up to date and not protected from the custom malware you placed in your document (fail number 3).

You now have remote access to their computer

Use the Device Scanner to see what options you have

Back