latest
Analysis tools
Introduction
What?
Why?
How?
Email header analysis
Sender’s IP address
Email body analysis
Files
URLs
Malware sandboxes
PhishTool
Case 1
Questions
Case 2
Questions
Case 3
Questions
Prevention
Introduction
What?
Why?
How?
Smarter mail servers
Signatures and encryption
General introduction problems
Patterns for NTA
Packet capture
Traffic analysis
Resources
SMTP and C&C communication
Recommended mitigation (per MITRE)
Detection opportunity (per MITRE)
User training
Challenges
Introduction
What?
Why?
How?
The Greenholt Phish
Questions
Phishing analysis and prevention
Phishing analysis and prevention
Blue Team
Improbability Blog
About the UU
Register
Challenges
Introduction
What?
Challenges
Why?
To practice.
How?
The Greenholt Phish
Read the Docs
v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds