After identifying a vulnerable port, Evan launched a targeted attack, exploiting weaknesses in the server's security protocols. Using techniques like SQL injection and cross-site scripting, he bypassed authentication measures, gaining unauthorized access to their server.
Once inside, Evan navigated through directories, searching for sensitive information where he employed techniques such as privilege escalation to gain higher levels of access, allowing himself to bypass additional security layers.
Now that he had access to Das Enterprise's secured server, Evan turned his attention to the employees' devices. By leveraging social engineering tactics, he crafted convincing phishing emails, enticing unsuspecting employees to click on malicious links or download infected attachments.
Then it was time to wait, fortunately, he didn't need to wait for long. Since the emails were being sent through official channels, people quickly clicked on them.