Most Recent
-
Phishing Analysis Tools: WALKTHROUGH
Remember from Phishing Room 1; we covered how to manually sift through the email raw source code to extract information. In this room, we will look at various tools that will aid us in analyzing phishing emails. We will: Warning: The samples throughout this room contain information from actual spam…
-
Secret Recipe: WALKTHROUGH
Storyline Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original copy of the recipe, and she only keeps it on her work laptop. Last week, James from the IT department was consulted to…
-
Critical: WALKTHROUGH
Incident Scenario Our user “Hattori” has reported strange behavior on his computer and realized that some PDF files have been encrypted, including a critical document to the company named important_document.pdf. He decided to report it; since it was suspected that some credentials might have been stolen,…