Here we’ll see some of the traps you can fall into while trying to create a phishing payload that uses webdav based lolbin. An EDR to bypass during a phishing compain Recently I was doing a phishing campain. As for each phishing campain, I reproduced the client’s standard environment in a lab, with the same…

Read More