Challenge: Phishing
Overview
This phishing challenge series consists of three hands-on scenarios designed to enhance your ability to detect and respond to phishing attacks. First, you have to analyze a real phishing email to determine if it is legitimate or a phishing attempt. Then, you will experience the consequences of failing victim to phishing by unknowingly submitting credentials on a fake login page. Finally you will investigate email headers to uncover key indicators of spoofing and detection used by attackers. Through these challenges, you will develop the basic skills needed to recognize and defend against phishing threats.Objectives
- Understand the different types of phishing attacks.
- Learn to recognize the signs of a phishing attempt
- Identify phishing indicators - Learn how to analyze emails URLs, and headers to detect phishing attemps
- Interact with a fake login page, and analyze the email header to uncover suspicious elements
Instructions
- Read carefully the provided materials on resources section.
- Read this guide to connect to the remote lab
- Complete the interactive task to practice identifying phishing attempts.