ByteMe
-
TryHackMe Walkthrough – The Greenholt Phish
Task 1: Just another day as a SOC analyst Only one task for this room. Question 1: What date was the email received? (answer format: M/DD/YY) I opened the email in Thunderbird. Answer: 6/10/20 Question 2: Who is the email from? In the From… Answer: Mr. James Jackson Question 3: What is his email address?
-
TryHackMe Walkthrough – Phishing Prevention
Task 1: Introduction Question 1: After visiting the link in the task, what is the MITRE ID for the “Software Configuration” mitigation technique? Follow the link to https://attack.mitre.org/techniques/T1598/#mitigations. Look for Software Configuration and the ID is there. Answer: M1054 Task 2: SPF (Sender Policy Framework Question 1: Referencing the dmarcian SPF syntax table, what prefix character
-
TryHackMe Walkthrough – Phishing Analysis Tools
Task 1: Introduction Question 1: No answer needed Task 2: What information should we collect? Question 1: No answer needed Task 3: Email header analysis Question 1: What is the official site name of the bank that capitai-one.com tried to resemble? This should be self-explanatory, google capitol one to see what their domain is. Answer:
-
Phishing Email Example | How To Report Phishing Attempts in Gmail
I received this email this morning and I thought it would be a great example to point out the issues in the email that flag it as a phishing email. Alright, here we have Jr. emailing us regarding an invoice. Two things off the bat, I’m not expecting anything from someone named Jr. and I
-
TryHackMe Walkthrough – Phishing Emails in Action
Task 1: Introduction Question 1: No answer needed Task 2: Cancel your PayPal order Question 1: What phrase does the gibberish sender email start with? This answer is in the reading. Look at the email address highlighted with a red circle 2. Answer: noreply
-
TryHackMe Walkthrough – Phishing Analysis Fundamentals
Task 1: Introduction Question 1: No answer needed. Task 2: The Email Address Question 1: Email dates back to what time frame? Answer is in the reading. Second paragraph. Answer: 1970s
-
Weekly Cybersecurity Wrap-up 11/13/23
Learn Cybersecurity with me. I’m posting my journey here. Webinars/Videos Articles Podcasts Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | Complete! TryHackMe – SOC Level 1(92 % Complete): Intro to Malware Analysis UDemy – Python for Cybersecurity – Gitlab
-
TryHackMe – Intro to Malware Analysis Walkthrough
In this walkthrough we will go step by step to answer the questions. Task 1: Introduction No questions here, so let’s keep moving. Task 2: Malware Analysis Question: Which team uses malware analysis to look for IOCs and hunt for malware in a network? The answer can be found in the reading in “The purpose
-
Weekly Cybersecurity Wrap-up 11/06/23
Webinars Some good youtubes this week… Articles Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | This is a long one, I’m still working on it. TryHackMe – SOC Level 1(91 % Complete): TheHive – Complete UDemy – Python for Cybersecurity – Gitlab
-
Smishing Example
What is Smishing? Smishing, a portmanteau of “phishing” and “SMS,” the latter being the protocol used by most phone text messaging services, is a cyberattack that uses misleading text messages to deceive victims. The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing
