The Phishing Test

A detailed walk through phishing attacks, user education and test!

Site Logo
  1. Overview
  2. Online Safety
  3. User Education
  4. The Test!
  5. Summary

Part One: What is Phishing?

What is Phishing?

Email Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

There are many type of phishing, some of these include:

Spear phishing

Attackers may gather personal information about their target to increase their probability of success.

Clone phishing

Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.

Whaling

Several phishing attacks have been directed specifically at senior executives and other high-profile targets within businesses, and the term whaling has been coined for these kinds of attacks.

Online Safety

This is place holder text, and purely that only. This is place holder text, and purely that only.

This is place holder text, and purely that only:

<this will be code>
This will be an explaination

This is place holder text, and purely that only.

User Education

This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only. This is place holder text, and purely that only.

This is place holder text, and purely that only:

This is place holder text, and purely that only. This is place holder text, and purely that only.

The Phishing Test!

Below is 'The Phishing Test' which allows users to test their skills (some of which are new) from the above content, however some things to note before starting:

This is Safe

We have removed all dangerous aspects of this test by screen shotting real world emails, there is a mixure of real phishing attacks and also legitimate emails.

Relevant Links

In the screen shots we have hovered over relevant links to assist with your detirmination of the email legitimacy.

Phishing

The attacker can insert a fake login form into the page using DOM manipulation, set the form's action attribute to target his own server, and then trick the user into submitting sensitive information.

Summary

Summary: Overview of Phishing Attack

Terminology

This is place holder text, and purely that only.