For a penetration test engagement, a security engineer decides to impersonate the IT help desk. The security engineer sends a phishing email containing an urgent request for users to change their passwords and a link to https://example.com/index.html. The engineer has designed the attack so that once the users enter the credentials, the index.html page takes the credentials and then forwards them to another server that the security engineer is controlling. Given the following information:
Which of the following lines of code should the security engineer add to make the attack successful?
vazq77
Highly Voted 10 months, 2 weeks agoSleezyglizzy
Most Recent 8 months, 1 week agoAlizade
12 months agomatheusfmartins
1 year, 2 months agobiggydanny
1 year, 6 months agoKingIT_ENG
1 year, 7 months ago[Removed]
1 year, 7 months ago[Removed]
1 year, 7 months agonickwen007
1 year, 7 months ago[Removed]
1 year, 7 months agocy_analyst
1 year, 7 months ago[Removed]
1 year, 7 months agocy_analyst
1 year, 7 months agoKingIT_ENG
1 year, 7 months ago