in Part 2, utilize the Metasploit Framework within Kali Linux tobuild a malicious office document that is frequently used to stealdata via vectors of attack such as email. Analyze (2-3 pages doublespaced and including screenshots) how you plan on presenting thisto users to collect these credentials.
Expert Answer
An answer will be send to you shortly. . . . .