The process of collecting user credentials (usernames, passwords, tokens) through techniques like phishing, keylogging, or man-in-the-middle attacks.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free