ASF-GitBook
CtrlK
LinkedInX (ex-Twitter)
  • PRESENTATION
  • Cloud/SysOps
    • Securing your AWS Infrastructure
    • Send_email_with_RSS_feed_content
    • Count_how_many_actives_users_service_account
    • Active Directory Tiering
  • Asset Security
    • Securing your BIOS / UEFI
    • Smartphones_configuration
  • GRC
    • Vulnerability Management Basics
    • Ready_for_cyber_disaster
    • Cyber threat mapping
    • Be prepare for Cybercrises
  • Security Assessment and Testing
    • Newsletter_CVE
    • CISA_KEV_Alert_Script
    • Create a SOC lab
  • FORENSICS
    • IR playbook
    • Investigate Phishing
      • Why fighting phishing is important?
      • Why is blocking the sender not enough?
      • Process Overview
      • Prerequisites
      • What to do now that we know the email is malicious?
      • Feedback
      • Tools
      • Report the email to the authorities
      • Go further
  • INCIDENT HANDLING
    • TweetFeed Jira Check
    • Rebuild_your_AD_after_compromise
    • Restore AD without third party software
    • Windows-Emergency-update-out-of-WSUS-schedule
    • OS for Blue Team work
  • UNIVERSITAIRES (unis)
    • Books CTI Fundamentals
    • Security Certification Roadmap
Powered by GitBook
On this page
  1. FORENSICS

Investigate Phishing

Process and tool for investigating a malicious email

Why fighting phishing is important?Why is blocking the sender not enough?Process OverviewPrerequisitesWhat to do now that we know the email is malicious?FeedbackToolsReport the email to the authoritiesGo further
PreviousRansomwareNextWhy fighting phishing is important?