A lot has changed since I wrote the first part of phishing with EV and this is the right time to release the final part of this series. Let’s get on.
The Blog
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get on.