ByteMe

  • TryHackMe Walkthrough – The Greenholt Phish

    Task 1: Just another day as a SOC analyst Only one task for this room. Question 1: What date was the email received? (answer format: M/DD/YY) I opened the email in Thunderbird. Answer: 6/10/20 Question 2: Who is the email from? In the From… Answer: Mr. James Jackson Question 3: What is his email address?

    read more

  • TryHackMe Walkthrough – Phishing Prevention

    Task 1: Introduction Question 1: After visiting the link in the task, what is the MITRE ID for the “Software Configuration” mitigation technique? Follow the link to https://attack.mitre.org/techniques/T1598/#mitigations. Look for Software Configuration and the ID is there. Answer: M1054 Task 2: SPF (Sender Policy Framework Question 1: Referencing the dmarcian SPF syntax table, what prefix character

    read more

  • TryHackMe Walkthrough – Phishing Analysis Tools

    Task 1: Introduction Question 1: No answer needed Task 2: What information should we collect? Question 1: No answer needed Task 3: Email header analysis Question 1: What is the official site name of the bank that capitai-one.com tried to resemble? This should be self-explanatory, google capitol one to see what their domain is. Answer:

    read more

  • Phishing Email Example | How To Report Phishing Attempts in Gmail

    I received this email this morning and I thought it would be a great example to point out the issues in the email that flag it as a phishing email. Alright, here we have Jr. emailing us regarding an invoice. Two things off the bat, I’m not expecting anything from someone named Jr. and I

    read more

  • TryHackMe Walkthrough – Phishing Emails in Action

    Task 1: Introduction Question 1: No answer needed Task 2: Cancel your PayPal order Question 1: What phrase does the gibberish sender email start with? This answer is in the reading. Look at the email address highlighted with a red circle 2. Answer: noreply

    read more

  • TryHackMe Walkthrough – Phishing Analysis Fundamentals

    Task 1: Introduction Question 1: No answer needed. Task 2: The Email Address Question 1: Email dates back to what time frame? Answer is in the reading. Second paragraph. Answer: 1970s

    read more

  • Weekly Cybersecurity Wrap-up 11/13/23

    Learn Cybersecurity with me. I’m posting my journey here. Webinars/Videos Articles Podcasts Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | Complete! TryHackMe – SOC Level 1(92 % Complete): Intro to Malware Analysis UDemy – Python for Cybersecurity – Gitlab

    read more

  • TryHackMe – Intro to Malware Analysis Walkthrough

    In this walkthrough we will go step by step to answer the questions. Task 1: Introduction No questions here, so let’s keep moving. Task 2: Malware Analysis Question: Which team uses malware analysis to look for IOCs and hunt for malware in a network? The answer can be found in the reading in “The purpose

    read more

  • Weekly Cybersecurity Wrap-up 11/06/23

    Webinars Some good youtubes this week… Articles Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | This is a long one, I’m still working on it. TryHackMe – SOC Level 1(91 % Complete): TheHive – Complete UDemy – Python for Cybersecurity – Gitlab

    read more

  • Smishing Example

    What is Smishing? Smishing, a portmanteau of “phishing” and “SMS,” the latter being the protocol used by most phone text messaging services, is a cyberattack that uses misleading text messages to deceive victims. The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing

    read more