Showing posts with label THM Walkthrough. Show all posts
Showing posts with label THM Walkthrough. Show all posts

Saturday, January 17, 2026

TryHackMe - Phishing Prevention room

 TryHackMe - Phishing Prevention room

Phishing Prevention is the fourth room in TryHackMe’s Phishing Analysis module under the SOC Level 1 path. If you're working through the room and get stuck, this guide provides clear hints and answers to help you progress without frustration.

Task 2

Q1 Based on TryHackMe's SPF record above, how many domains are authorized to send email on its behalf?

3

Q2 What is the intended action of an email that returns a SoftFail verification result?

Flag



Task 3

Q1 Based on the sample header above, what is the reason for the permerror?

no key for signature


Task 4

Q1 Which DMARC policy provides the greatest amount of protection by blocking emails that fail the DMARC check?

p=reject


Task 5

Q1  Which S/MIME component ensures that only the intended recipient can read the contents of an email message?

Can be found in description of the task - encryption


Task 6

Q1 Which Wireshark filter can you use to narrow down your results based on SMTP response codes?

smtp.response.code

Q2 How many packets in the capture contain the SMTP response code 220 Service ready?

19

Q3 One SMTP response indicates that an email was blocked by spamhaus.org. What response code did the server return?

553

Q4 Based on the packet from the previous question, what is the full Response code: message?

Requested action not taken: mailbox name not allowed (553)

Q5 Search for response code 552. How many messages were blocked for presenting potential security issues?

6


Task 7 

Q1 How many SMTP packets are available for analysis? 

FIlter pcap file for smtp traffic and count of them is your answer

Q2  What is the name of the attachment in packet 270?

I was sorting the packets by id/number and search for 270 and checked for Line-based text data and seen it there. 

Or use option ctrl g and enter the number and go to that packet.

Q3 According to the message in packet 270, which Host IP address is not responding, making the message undeliverable?

You can read through the email content and find the correct IP

Q4 By filtering for imf, which email client was used to send the message containing the attachment attachment.scr?

filter by imf and then look through emails for which email contains the attachment.

Q5  Which type of encoding is used for this potentially malicious attachment?

Answer can be found information under Content-Transfer-Encoding 

Task 8 

Q1 A security team wants to implement a control to detect hidden malware inside email attachments.
They need a way to analyze suspicious files without risking infection on real systems.
Which protective technique would allow them to observe a file's behavior safely?

Answer can be found in explanation part of this task - Sandboxing

TryHackMe - Phishing Prevention room

 TryHackMe - Phishing Prevention room Phishing Prevention is the fourth room in TryHackMe’s Phishing Analysis module under the SOC Level 1 p...