The Phishing Pond TryHackMe Writeup
文章介绍了一个名为“Phishing Pond”的训练室,通过真实邮件示例教授如何识别钓鱼攻击。它分析了常见的钓鱼手法如伪装域名、紧急请求、恶意附件等,并指导用户分类邮件以完成挑战。最终获得flag并提升识别能力。 2025-12-10 14:1:19 Author: infosecwriteups.com(查看原文) 阅读量:5 收藏

Death Esther

Press enter or click to view image in full size

Room Introduction

The Phishing Pond is designed to build practical phishing-detection skills through a set of real-world email examples. The room teaches how attackers craft deceptive messages and which red flags to look for when reviewing suspicious emails. It focuses on the most common phishing tactics, including urgency in subject lines, look-alike domains, display-name impersonation, malicious attachments, compromised sender accounts, and offers that attempt to gather personal or financial information.

The goal of the lab is simple. Review each email, decide whether it is legitimate or a phishing attempt, and identify the indicators that reveal the attacker’s intent. At the end of the challenge, the final flag is provided once all emails are correctly classified.

Starting the Phishing Analysis

Press enter or click to view image in full size

I reached the main interface of the room and began working through the emails. Let’s dive into Level 1.

Level 1

Press enter or click to view image in full size

This is a phishing email.
Reason: It impersonates an executive and requests an urgent wire transfer.

Level 2

Press enter or click to view image in full size

This is not a phishing email.

Level 3

Press enter or click to view image in full size

This is not a phishing email.

Level 4

Press enter or click to view image in full size

This is not a phishing email.

Level 5

Press enter or click to view image in full size

This is a phishing email.
Reason: Contains an attachment and asks to enable macros.

Level 6

Press enter or click to view image in full size

This is a phishing email.
Reason: Contains a suspicious third-party survey link.

Level 7

Press enter or click to view image in full size

This is a phishing email.
Reason: Offers require sensitive personal or banking details.

Level 8

Press enter or click to view image in full size

This is a phishing email.
Reason: Redirects to a malicious password rest page.

Level 9

Press enter or click to view image in full size

This is a phishing email.
Reason: Link uses a deceptive to mimic a payment portal.

Level 10

Press enter or click to view image in full size

This is a phishing email.
Reason: Asks to enable macros in an attachment.

Press enter or click to view image in full size

Flag

THM{i_phish_you_not}

Press enter or click to view image in full size

Thanks for reading. I hope this walkthrough helps sharpen your phishing analysis skills and gives you a clearer view of how real-world email threats operate.


文章来源: https://infosecwriteups.com/the-phishing-pond-tryhackme-writeup-ebaaacdb8da2?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh