From the course: Wireshark: Malware and Forensics
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Response: Email forensics - Wireshark Tutorial
From the course: Wireshark: Malware and Forensics
Response: Email forensics
(upbeat music) - [Instructor] In this challenge, I wanted to do a forensic exercise on a suspicious email so that we can learn more information on where that email came from and see how email providers detect possible spam and phishing emails. So the first thing is I wanted you to take a look at the image and tell me a couple of ways that the email looks legitimate. What would make someone click on a link? Well, it has the correct email address and along the bottom, there's copyright notification that seems official. It looks like it came from my email provider which is a company I know or trust. And then there's a sense of urgency, but not too urgent. Meaning one or more of your emails will be deactivated soon. So we can see why someone might click on the link. But down below, I wanted you to take a look at how this email looks suspicious. Well, first it misspelled the word warning and it wanted me to click on a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Exploring cyberattacks and trends5m
-
(Locked)
Understanding malware and cyber threats2m 35s
-
(Locked)
Packet analysis overview2m 59s
-
(Locked)
Outlining the benefits of Wireshark3m 25s
-
(Locked)
Tshark4m 52s
-
(Locked)
Tap into your network4m 40s
-
(Locked)
Create firewall rules3m 53s
-
(Locked)
Challenge: Email forensics3m 37s
-
(Locked)
Response: Email forensics3m 56s
-
-
-
-
-