𝔖 Scriptorium
✦   LIBER   ✦

📁

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

✍ Scribed by Nicholas Oles


Publisher
Apress
Year
2023
Tongue
English
Leaves
153
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.

Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.

Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.

This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.

You Will Learn How to:
• Safely save email messages as attachments for analysis
• Identify what information is in an email header
• Review header information and extract key indicators or patterns used for detection
• Identify signs of a suspicious or malicious email message
• Detect the tactics that attackers use in phishing emails
• Safely examine email links and attachments
• Use a variety of free and simple tools to analyze email messages

Who This Book Is For
Cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.

✦ Table of Contents


Table of Contents
About the Author
About the Technical Reviewer
Acknowledgements
Chapter 1: How Email Works
Understanding Email Architecture
Step 1
Step 2
Step 3
Step 4
Step 5
Email Header and Content
Gmail Web Mail
Yahoo! Web Mail Application
Outlook Desktop Mail Application
Email Header Analysis Tools
MxToolbox
Google Admin Toolbox
Microsoft Message Header Analyzer
Summary
Chapter 2: Phishing Tactics and Techniques
Summary
Chapter 3: Incident Response
PICERL
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Summary
Chapter 4: Analyzing Message Content
What Is Content?
Message Greetings
Threatening or Urgent Requests
Impersonation Attempts
Summary
Chapter 5: All About Links
What Is a Link?
Links in Emails
What to Do
Link Hovering
Link Extraction
VirusTotal
urlscan.io
URLVoid
Summary
Chapter 6: How to Handle Attachments
What Is an Email Attachment?
Does the Attachment Make Sense?
Malware
Evaluating Attachments
Static and Dynamic Reviews
Extracting Attachments
VirusTotal
Sandboxing
ANY.RUN
Hybrid Analysis
Summary
Chapter 7: Log Searching and Response
What Are Logs?
Centralized Log Management
Security Onion and Splunk
Security Onion
Splunk
Summary
Chapter 8: Remediation and Lessons Learned
Reimaging Your PC
Remediation
Windows Updates
Lessons Learned
Summary
Index

✦ Subjects


Security; Information Security; Social Engineering; Phishing; Email


📜 SIMILAR VOLUMES


How to Catch a Phish: A Practical Guide
✍ Nicholas Oles 📂 Library 📅 2023 🏛 Apress 🌐 English

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization a

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles 📂 Library 📅 2023 🏛 Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><

How to Catch a Phish: A Practical Guide
✍ Nicholas Oles 📂 Library 📅 2023 🏛 Apress 🌐 English

<p><span>Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.</span></p><p><

Phishing and Communication Channels: A G
✍ Gunikhan Sonowal 📂 Library 📅 2021 🏛 Apress 🌐 English

<p>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</p> <p>The aim of phishing is to fraudulently obtain sensitive credentials such as passwo

Phishing and Communication Channels: A G
✍ Gunikhan Sonowal 📂 Library 📅 2021 🏛 Apress 🌐 English

<p>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</p> <p>The aim of phishing is to fraudulently obtain sensitive credentials such as passwo

Phishing and Communication Channels: A G
✍ Gunikhan Sonowal 📂 Library 📅 2021 🏛 Apress 🌐 English

<p><span>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</span></p><p><span>The aim of phishing is to fraudulently obtain sensitive credenti