From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials.
From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials.