INTRODUCTION
Spam and phishing are attacks that trick people into giving away personal information or taking actions that benefit the attacker. Email phishing uses fraudulent emails to trick recipients into clicking on malicious links or attachments, leading to malware infections, identity theft, or financial loss. Phishing emails often have grammatical errors, unusual formatting, and suspicious sender addresses. They create a sense of urgency or evoke emotions to pressure the victim into acting without thinking critically.
TASK 2: The Email address
Answers: 1970s
TASK 3: Email Delivery
Answers:
465
993
995
Task 4: Email Headers
This task is to understand the components of what makes up an email message when it arrives in an inbox.
Answers:
Task 5. Email Body:
The command telnet uses the TELNET protocol for remote administration.
Answers:
Payment-updateid.pdf
THM{BENIGN_PDF_ATTACHMENT}
Task 6: ID, Types of Phishing
Answers:
Home depot
Order Placed : Your Order ID, OD2321657089291 Placed placed successfully.
hxxp[://]t[.]teckbe[.]com/p/?j3=EOowFcEwFHl6EOAyFcoUFV=TVEchwFHlUFOo6lVTTDcATE7oUE7AUET==
CONCLUSION
the following is summary of what was covered in this room
What makes up an email address?
How an email travels from sender to recipient.
How to view the source code of an email header.
How to view the source code of an email body.
Understand the pertinent information we should obtain from the email we're analyzing.
Some common techniques attackers use in spam and phishing email campaigns.