About / Forums / PENETRATION TESTER / Introductory topic for PENETRATION TESTER course
- This topic has 5 replies, 5 voices, and was last updated 1 month, 1 week ago by Petros Kavazis.
-
AuthorPosts
-
Dear participants, welcome to the forum discussion of PENETRATION TESTER course!
Please give us your answer/opinion about the following:
- How do you handle suspicious emails or messages in your inbox?
- How often do you update your passwords for online accounts?
March 22, 2024 at 9:20 pm #6054If I receive a suspicious email or message in my inbox, here are some steps I can take to handle it:
Initial Evaluation: Begin by scrutinizing the sender’s details, subject line, and message content for any anomalies or signs of suspicion.
Confirm Sender Identity: Verify the authenticity of the sender’s email address to ensure it hasn’t been spoofed or compromised.
Content Examination: Analyze the email’s language, tone, and any requests for urgency or sensitive information, as well as attachments, for potential risks.
Check Links and Attachments: Exercise caution when interacting with links or downloading attachments, verifying their legitimacy by hovering over links and inspecting file types.
Utilize Security Measures: Make use of email security features and anti-phishing tools to automatically detect and mitigate potential threats.
Prompt Reporting: Report any suspicious emails to the appropriate IT or security personnel promptly to prevent further exposure to risk.
March 25, 2024 at 4:47 pm #6059When I receive suspicious emails or messages in my inbox, I exercise caution by carefully scrutinising the sender’s address, examining the content for any red flags such as spelling errors or urgent requests for personal information, and refraining from clicking on any links or downloading attachments from unknown sources. To remain on top of popular phishing strategies, I use email filtering software and update my cybersecurity skills on a regular basis. When it comes to upgrading passwords for online accounts, I make it a point to do so on a regular basis, usually every few months, to improve security and reduce the danger of unauthorised access.
March 25, 2024 at 4:47 pm #6060Changing passwords is generally advised, ideally every few months, especially for important accounts like social media, email, and banking. Changing passwords on a regular basis reduces the possibility of unwanted access brought on by prospective data breaches or password compromises.
April 29, 2024 at 2:55 pm #6049Suspicious emails or messages are often filtered out and don’t appear in my email inbox but in the client’s spam folder. However, if there are emails that catch my interest or if a suspicious-looking email does make it through into my inbox, I view the original raw message to examine the email headers, looking for telltale signs of malicious content or intent. I continue with reviewing the email body. Under all circumstances, I avoid double-clicking on an email attachment or opening any included hyperlinks unless I’m confident they aren’t malicious.
Characteristics I look out for include urgency, poor grammar and/or typos, spoofed email addresses, HTML designed to impersonate a legitimate brand, link manipulation, and attachments.
Tools like PhishTool (https://www.phishtool.com/) and other utilities such as https://mailheader.org/ can assist in the analysis. However, I rarely delve deeply into these tools and instead discard what appears suspicious rather quickly. If curiosity takes over, I use the mentioned tools and check the sender’s IP address with https://ipinfo.io/, for instance, or run a quick reputation check at https://talosintelligence.com/reputation. There’s a lot that can be done in handling suspicious emails, but the first and most important step is for the warning bell to go off before clicking or downloading anything. Suspicion must kick in prior to any potential harm.
In the event that an attachment needs further examination, I would create a hash of the attachment and verify it with VirusTotal to see if it has been flagged as potentially malicious or overwhelmingly safe. However, the results do not guarantee that I would blindly open the attachment. If my gut feeling persists because the entire message is unsolicited, I won’t open the file and will simply discard the message altogether.
October 8, 2024 at 4:01 pm #7136Handling Suspicious Emails or Messages:
1. I verify the Sender’s email address to identify signs of phishing or spoofing. If the email appears to come from a legitimate source but seems suspicious, I cross-reference it with official contact details.
2. I never click on any links or open attachments from untrusted or unexpected emails. Instead, I hover over links to see if they match legitimate URLs and, when necessary, I open them in a sandboxed environment(https://www.browserling.com/).
3. If I suspect an email to be part of a phishing campaign, I report it to the appropriate internal team or my AV’s abuse service for further analysis.
4. Using tools like MXToolbox or manual header analysis, I inspect the email’s metadata for inconsistencies that indicate a spoofed origin or malicious content.
5. For clear-cut cases of phishing or scam attempts, I block the sender, report it and delete the email to avoid accidental exposure in the future.Frequency of Password Updates:
– I update passwords at least every 3-6 months, depending on the sensitivity of the account or when my credentials have been leaked. -
AuthorPosts
- You must be logged in to reply to this topic.