Apr 9 · 8 min read · This post covers the full analysis workflow — how email works, types of phishing, collecting artifacts, analyzing them with tools, and taking defensive action. How Email Works Before analyzing phishi
Join discussionApr 5 · 2 min read · 1. Getting the logs into Splunk The task provided a web_activity.log file with HTTP requests grouped by internal IP addresses. My first step was to bring this data into Splunk so I could query and vis
Join discussion