Conducting Ethical Phishing Attack [closed]
For research purposes, I’m conducting an ethical phishing attack in my institution. I have permission from the institution for the same. I’ve created the phishing site and the email content, and I’ll be recording who and how many users vis…