· Lab – Phishing Trace
Attached Files:
o File Week 5 – trace IP Physical Location.rtf (38.189 KB)
Lab WK 5
Scenario:
You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.
2. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
3. From own email view the source code (Google it – Depending on your system or browser)
4. Search the source code (Control+F) enter Sender
5. Use one of the links below to physically locate the IP
· Trace the IP
· What’s My IP (https://whatismyipaddress.com)
In a word document:
· Copy the source code and paste it “highlight the senders IP”
· Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown.
Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
Mac
Outlook (Windows)
Web Browser Google or Gmail
· Assignment
Extra Credit Lat and Long
5 Points Extra Credit
Instructions for Google Maps
From the previous exercise enter the Latitude and Longitude in Google Maps
Example: 37° 45′ 3.60″ N, 97° 49′ 19.20″ W
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is
for the sole use of the intended recipient(s) and may contain confidential
and privileged information or may otherwise be protected by law. Any
unauthorized review, use, disclosure or distribution is prohibited. If you
are not the intended recipient, please contact the sender by reply e-mail
and destroy all copies of the original message and any attachment thereto.