Phishing Analysis

Phishing Analysis

Spotting spam and phishing emails

INTRODUCTION

Spam and phishing are attacks that trick people into giving away personal information or taking actions that benefit the attacker. Email phishing uses fraudulent emails to trick recipients into clicking on malicious links or attachments, leading to malware infections, identity theft, or financial loss. Phishing emails often have grammatical errors, unusual formatting, and suspicious sender addresses. They create a sense of urgency or evoke emotions to pressure the victim into acting without thinking critically.

TASK 2: The Email address

Answers: 1970s

TASK 3: Email Delivery

Answers:

  1. 465

  2. 993

  3. 995

Task 4: Email Headers

This task is to understand the components of what makes up an email message when it arrives in an inbox.

Answers:

  1. Return-Path

  2. arin.net

Task 5. Email Body:

The command telnet uses the TELNET protocol for remote administration.

Answers:

  1. i.imgur.com/LSWOtDI.png

  2. Payment-updateid.pdf

  3. THM{BENIGN_PDF_ATTACHMENT}

Task 6: ID, Types of Phishing

Answers:

  1. Home depot

  2. support@teckbe.com

  3. Order Placed : Your Order ID, OD2321657089291 Placed placed successfully.

  4. hxxp[://]t[.]teckbe[.]com/p/?j3=EOowFcEwFHl6EOAyFcoUFV=TVEchwFHlUFOo6lVTTDcATE7oUE7AUET==

CONCLUSION

the following is summary of what was covered in this room

  • What makes up an email address?

  • How an email travels from sender to recipient.

  • How to view the source code of an email header.

  • How to view the source code of an email body.

  • Understand the pertinent information we should obtain from the email we're analyzing.

  • Some common techniques attackers use in spam and phishing email campaigns.