Skip to main content
  1. Socs/

Email-Based Phishing - Analysis

·1 min· loading · loading · ·
Peter Kinyumu
Author
Peter Kinyumu
I like to make sense out of nonsense

Last time we discussed various authentication methods(SPF, DKIM, DMARC) used in email and also explored the various email headers that offer insightful information about the email. Today we are going to take a practical approach to analysis and investigate the email headers of one malicious email.

…..to be published