Phishing - Merry Clickmas AoC2025 Tryhackme
"Learn how to identify, analyze, and mitigate phishing attacks with the TryHackMe Phishing AoC 2025 room. Improve cybersecurity skills, email threat analysis, OSINT, and phishing detection techniques through hands-on challenges."
OFFENSIVE SECURITYADVENT OF CYBER 2025PENETRATION TESTERVULNERABILITY ANALYSISTRYHACKME WRITEUPSPHISHINGCTFPENETRATION TESTINGEXPLOITATIONTRYHACKME WALKTHROUGHCYBERSECURITY CHALLENGESTRYHACKME ROOM SOLUTIONSTRYHACKME ANSWERSCYBERSECURITY LABSCYBERSECURITYETHICAL HACKINGTRYHACKMEPHISHING ANALYSISHANDS ON SECURITY LABSSOCIAL ENGINEERING TOOLKITSETOOLKITGITHUB
Jawstar
12/3/20253 min read


Task 2 : Phishing Exercise for TBFC
Phishing
Phishing is a subset of social engineering in which the communication medium is mostly messages. At one point, the most common phishing attacks happened via email; however, the spread of smartphones, along with ubiquitous Internet access, has spread phishing to short text messages (smishing), voice calls (vishing), QR codes (quishing), and social-media direct messages. The attacker’s purpose is to make the target user click, open, or reply to a message so that the attacker can steal information, money, or access.
Unfortunately, phishing attacks are becoming harder to spot. Even careful people might fall target to such attacks if they don’t exercise proper care. TBFC cyber security awareness training teaches users about two anti-phishing mnemonics written as S.T.O.P. The first S.T.O.P. is from All Things Secured, which tells users to ask the following questions before acting on an email:
Suspicious?
Telling me to click something?
Offering me an amazing deal?
Pushing me to do something now?
The second S.T.O.P. reminds users to follow the following instructions:
Slow down. Scammers run on your adrenaline.
Type the address yourself. Don’t use the message’s link.
Open nothing unexpected. Verify first.
Prove the sender. Check the real From address/number, not just the display name.
After hours of periodic cyber security training, the red team checks to see if the TBFC staff can dodge “fishy” emails.
Building the Trap
You must sound very convincing as a penetration tester for a successful phishing attack. It’s not only how you write the phishing email or messages, but also how you set up the trap for the target. The trap can be anything, depending on your objectives and the research you conduct on the target. Sometimes, attackers aim to compromise the target’s machine, and they achieve this by attaching a malicious file to their phishing email. Attackers sometimes craft a web page that mimics a legitimate login page to steal the target’s credentials.
In this task, we aim to acquire the target user’s login credentials. Our trap would be a fake TBFC portal login page, which we attach to the phishing email and send to the target. But a login page itself is not enough. We need to host it and implement some logic to capture the credentials entered by the target. To facilitate your task, we have already set up a script that, when run, will host a fake login page. The phoney login page we created will capture all the credentials entered into the page.
Delivery via Social-Engineer Toolkit (SET)
As our phishing page is ready, we can now prepare and send the phishing email to our target users. Sending it from our personal email is the worst idea. Ideally, the email should appear to be coming from a legitimate-looking sender; for example, we can pretend to be somebody the target user trusts or expects to get such an email from them. The more a phishing email appears realistic, the more likely it is for the target user to believe it and get phished. The question is how we can send a realistic-looking email that contains our fake login page.
One solution is to use the Social-Engineer Toolkit (SET). It is an open-source tool primarily designed by David Kennedy for social engineering attacks. It offers a wide range of features. In particular, it lets you compose and send a phishing email. In the current scenario, we will use this tool to create and send a phishing email to the target user.
Answer the questions below
What is the password used to access the TBFC portal?
unranked-wisdom-anthem
Browse to http://MACHINE_IP from within the AttackBox and try to access the mailbox of the factory user to see if the previously harvested admin password has been reused on the email portal. What is the total number of toys expected for delivery?
1984000

Subscribe for all Days Answers of Advent of Cyber 2025
Connect
Secure your future with expert cybersecurity solutions
Support
Quick Links
© 2025. All rights reserved.
contact@jawstarsec.in
