During my school internship I had to develop few interesting tasks. Previously I talked about the USB reverse shell program I built, but there was another very interesting exercise I was tasked with creating and that was a forensics exercise where the one doing the exercise would have to analyze the phishing server log files to determine –
- Who sent the phishing emails.
- Which users received these emails.
- Which users opened the emails.
- Which users entered their credentials on the phishing site.
Here’s how I approached the task: