I have a few questions
When it comes to working primarily with smart phones to gain access to a info what are the general things you can do when you will never come in to contact with a persons phone.
what type of sms phishing can you do.
will mitm work for sms attacks to gain access
can you send a spoof page to a mobile phone from cpu
were does backtrack play a roll in sms phish attacks
what are some thing I can try to social engineer a login through cpu to mobile phone
sayse