Cyber security

Harshbhandage
4 min readJun 10, 2023

--

Email Classification: Distinguishing btw Phishing and Legitimate Emails

Emails are a widely used communication medium, but they can also be exploited by malicious individuals for phishing attempts.

In this activity, we will identify and classify a set of emails into two categories: phishing emails and legitimate emails.

Click on the above tab to start the activity.

Some of the screenshots of Phishing and legitimate emails:

Document attached to this email is not legitimate.
The sender's email name (noreply@efacks.com) and the company name (efax) does not match.
The photo attached to this email has a look-alike URL. The real domain is “sytez.net” which is made to look like Google drive.
Its a legitimate Email sent by dropbox.com
Pdf’s can contain malware or viruses, we should always be certain to trust the sender
This is a phishing Email which links to a fake login page.
This is a legitimate Email sent by official google.com.

Tor Browser:

Tor is the strongest tool for privacy and freedom online. It is free and open source software maintained by the Tor Project and a community of volunteers worldwide.

Download Tor Browser from here:

https://www.torproject.org/download/

Why is onion used for Tor?

Ans: Specifically, Tor is a communication protocol that uses a network of relays to stop others from tracking you. The “onion” metaphor is used to indicate the layers upon layers of encryption applied, rendering it difficult to determine who you are and track your online activities.

Reference: https://seon.io/resources/dictionary/tor/

Working with Advanced Google Search Operators

Steps to gather information using Advanced Google Hacking Techniques.

  1. Your system should be Windows10.
  2. Open any web browser and navigate to https://www.google.com.
  3. Once Google search engine appears if any pop up window appears ignore click no.
  4. Type intitle:password site:www.eccouncil.org and press Enter — it uses intitle and site google advanced operators which restricts to pages on the www.eccouncil.org website that contains the term password in the title.

5.Navigate back to https://www.google.com in search bar, type the comand ec-council filetype:pdf and press Enter to search your results based on file extension

6.you can also use following to perform an advanced search to gather more info . cache: This operator allows you to view cached version of the web page

[cache:www.google.com]

7. allinurl: This operator restricts results to pages containing all the query terms specified in the url

[allinurl: google career]

8. inurl: This operator restricts the results to pages containing the word specified in the url.

[inurl: copy site:www.google.com]

9. allintitle: This operator resticts results to pages containing all the query terms specified in the title.

[allintitle:detect malware]

10. inanchor: This operator restricts results to pages containing the query terms specified in the anchor text on limnks to the page.

[Anti-virus inanchor:Norton]

11. link: links to the specified website or page

[link:www.instagram.com]

points to guide home page

12. related: displays websites similar or related to the url

[related:www.certifiedhacker.com]

13. GATHER info from video search engines

1. Open your browser and navigate to htts://www.youtube.com

2. in the search bar search for your target organization you will see al the latest videos

3. Select any video of your choice right click on the video title, and click copy link location

4. After that navigate to https://youtube-thumbnail-grabber.com/ and go

5. Now you can find the thumbnails

--

--