A lot has changed since I wrote the first part of phishing with EV and this is the right time to release the final part of this series. Let’s get on.
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get on.