cybersecurity

  • TryHackMe Walkthrough – Phishing Prevention

    Task 1: Introduction Question 1: After visiting the link in the task, what is the MITRE ID for the “Software Configuration” mitigation technique? Follow the link to https://attack.mitre.org/techniques/T1598/#mitigations. Look for Software Configuration and the ID is there. Answer: M1054 Task 2: SPF (Sender Policy Framework Question 1: Referencing the dmarcian SPF syntax table, what prefix character

    read more

  • TryHackMe Walkthrough – Phishing Analysis Tools

    Task 1: Introduction Question 1: No answer needed Task 2: What information should we collect? Question 1: No answer needed Task 3: Email header analysis Question 1: What is the official site name of the bank that capitai-one.com tried to resemble? This should be self-explanatory, google capitol one to see what their domain is. Answer:

    read more

  • Phishing Email Example | How To Report Phishing Attempts in Gmail

    I received this email this morning and I thought it would be a great example to point out the issues in the email that flag it as a phishing email. Alright, here we have Jr. emailing us regarding an invoice. Two things off the bat, I’m not expecting anything from someone named Jr. and I

    read more

  • TryHackMe Walkthrough – Phishing Emails in Action

    Task 1: Introduction Question 1: No answer needed Task 2: Cancel your PayPal order Question 1: What phrase does the gibberish sender email start with? This answer is in the reading. Look at the email address highlighted with a red circle 2. Answer: noreply

    read more

  • TryHackMe Walkthrough – Phishing Analysis Fundamentals

    Task 1: Introduction Question 1: No answer needed. Task 2: The Email Address Question 1: Email dates back to what time frame? Answer is in the reading. Second paragraph. Answer: 1970s

    read more

  • Weekly Cybersecurity Wrap-up 11/13/23

    Learn Cybersecurity with me. I’m posting my journey here. Webinars/Videos Articles Podcasts Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | Complete! TryHackMe – SOC Level 1(92 % Complete): Intro to Malware Analysis UDemy – Python for Cybersecurity – Gitlab

    read more

  • TryHackMe – Intro to Malware Analysis Walkthrough

    In this walkthrough we will go step by step to answer the questions. Task 1: Introduction No questions here, so let’s keep moving. Task 2: Malware Analysis Question: Which team uses malware analysis to look for IOCs and hunt for malware in a network? The answer can be found in the reading in “The purpose

    read more

  • Weekly Cybersecurity Wrap-up 11/06/23

    Webinars Some good youtubes this week… Articles Projects LinkedIn Learning – CompTIA Security+ Module 8: Network Security Design and Implementation | This is a long one, I’m still working on it. TryHackMe – SOC Level 1(91 % Complete): TheHive – Complete UDemy – Python for Cybersecurity – Gitlab

    read more

  • Smishing Example

    What is Smishing? Smishing, a portmanteau of “phishing” and “SMS,” the latter being the protocol used by most phone text messaging services, is a cyberattack that uses misleading text messages to deceive victims. The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing

    read more

  • TryHackMe – TheHive Project Walkthrough

    Task 1 & 2 are easy “I read this” ones, so let’s skip to… Task 3 Question 1: Which open-source platform supports the analysis of observables within TheHive? In the reading under “Observable Enrichment with Cortex” bullet it explains that One of the main feature integrations TheHive supports is Cortex Answer: Cortex

    read more