This has always been on the to-do list and I’ve never got around writing it. Let’s dive in and give you a taste of what is about to come.
A lot has changed since I wrote the first part of phishing with EV and this is the right time to release the final part of this series. Let’s get on.
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get on.