Phishing Analysis Tools
Learn the open-source tools used to aid an analyst to investigate suspicious emails as well phishing emails Tryhackme : https://tryhackme.com/room/phishingemails3tryoe Phishing Analysis Tools
PHISHING ANALYSISTOOLSTRYHACKME WRITEUPSSECURITYTRYHACKME WALKTHROUGHCYBERSECURITYETHICAL HACKINGTRYHACKMEOPEN-SOURCE TOOLSENCRYPTIONSPHISHING
9/27/20251 min read


Task 3 : Email header analysis
What is the official site name of the bank that capitai-one.com tried to resemble?
capitalone.com
Task 4 : Email Body Analysis
How can you manually get the location of a hyperlink?
Copy Link Location
Task 6 : Phishtool
Look at the Strings output. What is the name of the EXE file?
#454326_PDF.exe
Task 7 : Phishing Case 1
What brand was this email tailored to impersonate?
Netflix
What is the From email address?
NetfIix<JGQ47wazXe1xYVBrkeDg-JOg7ODDQwWdR@JOg7ODDQwWdR-yVkCaBkTNp.gogolecloud.com>________.___________.______
What is the originating IP? Defang the IP address.
209[.]85[.]167[.]226
From what you can gather, what do you think will be a domain of interest? Defang the domain.
etekno[.]xyz
What is the shortened URL? Defang the URL.
hxxps[://]t[.]co/yuxfZm8KPg?amp==1
Task 8 : Phishing Case 2
What does AnyRun classify this email as?
Suspicious activity
What is the name of the PDF file?
Payment-updateid.pdf
What is the SHA 256 hash for the PDF file?
cc6f1a04b10bcb168aeec8d870b97bd7c20fc161e8310b5bce1af8ed420e2c24
What two IP addresses are classified as malicious? Defang the IP addresses. (answer: IP_ADDR,IP_ADDR)
2[.]16[.]107[.]24,2[.]16[.]107[.]83
What Windows process was flagged as Potentially Bad Traffic?
svchost.exe
Task 9 : Phishing Case 3
What is this analysis classified as?
Malicious activity
What is the name of the Excel file?
CBJ200620039539.xlsx
What is the SHA 256 hash for the file?
5f94a66e0ce78d17afc2dd27fc17b44b3ffc13ac5f42d3ad6a5dcfb36715f3eb
What domains are listed as malicious? Defang the URLs & submit answers in alphabetical order. (answer: URL1,URL2,URL3)
biz9holdings[.]com,findresults[.]site,ww38[.]findresults[.]site
What IP addresses are listed as malicious? Defang the IP addresses & submit answers from lowest to highest. (answer: IP1,IP2,IP3)
75[.]2[.]11[.]242,103[.]224[.]182[.]251,204[.]11[.]56[.]48
What vulnerability does this malicious attachment attempt to exploit?
CVE-2017-11882
Task 10 : Conclusion
The tools covered in this room are just some that can help you with analyzing phishing emails.
As a defender, you'll come up with your own preferred tools and techniques to perform manual and automated analysis.
Here are a few other tools that we have not covered in detail within this room that deserve a shout:
That's all, folks! Happy Hunting!
Connect
Secure your future with expert cybersecurity solutions
Support
Quick Links
© 2025. All rights reserved.
contact@jawstarsec.in
