Introduction to Phishing - TryHackMe Simulator - My Overview


In this post I am going to talk about my experience with the TryHackMe SOC Simulator, so it’s not going to be a walk through but more of an overview of what it is and how it works.
The one we are going to be looking at today is the “Introduction to Phishing” simulation (free!).
Let’s boot up the simulation! Note that I am using Splunk in this task, Elastic is also available.
This is how it looks upon entering the simulator:
We can see we have an overview of the dashboard. Sections include Total alerts, Closed alerts, Closed as TP, Closed as FP and section sorting out Alert types and Open alerts.
A useful overview of what is going on.
The Alert queue section:
We can see various details ID and Severity, along with others here in a nice concise list. Along with Action where you click to begin investigating that alert.
Below is a look at Splunk after clicking the SIEM (Security Information and Event Management) link.
I first learned about Elastic, but the more and more I use Splunk, the more I like it. It’s very robust and filtering can be super streamlined. You can see by default it uses a wildcard to have everything included.
Clicking on the Analyst VM will bring you to a Windows VM:
There was a folder on the desktop with some attachments in it that I didn’t end up using - might be for another exercise, not sure. The screenshot shows what a shortcut on the desktop brings us to. Some kind of scanning tool/site that we can put files, URL’s and IP’s into.
Below we see Documentation, there’s a fair bit of it, but very useful. With Company Information being a particular hot spot.
We have a section for Playbooks which I read through before beginning the tasks.
Clicking there will bring you to different nodes that you can click on for further information. I had a weird issue where when I clicked on a node, it wouldn’t let me go “back”. There wasn’t a way to close it or go back to I would have to refresh.
Case reports below allows us to navigate to the cases we have submitted.
Finally there is a Guide which looks to be the same guide that we see while everything loads upon launching the simulation.
I would make sure you read everything and download all this information to your head first as this will make working through the tasks a lot easier.
What we want to do is head to the Alert Queue where we will see our alerts. We’re looking for True Positives so upon reflection, it would make sense to start with the alerts that have the highest severity although I found that looking deeper into the lesser threatening ones really helped build a picture of what actually happened but that might be a waste of time? I certainly took my time!
Once we get the information needed within the alert we can use that information to find out more about the target or victim of the attack. This is where the Documentation comes into play.
We can take notes of possible IOC (Indicators of Compromise), IP’s, URL’s and such. Or just paste it into some kind of notepad see we can easily get this information into the SIEM.
From there we can start digging, perhaps using the timestamp might be a good start to get the exact alert? Perhaps looking up the email, host name, IP address or anything else noted down. We need to use what we know and continue from there.
Finding suspicious URL’s, IP’s and Files could be than scanned or analysed on the Analyst VM.
Once we have a good picture in our minds of what has happened we can then Write case report.
Here we need to decide if this event was a True Positive or False Positive.
A True Positive being an event that’s happened and is malicious that may or may not need escalation.
A False Positive being an event that’s tripped up or alerts the SIEM or other tools by accident or because of some strange behaviour either from someone innocent or faulty hardware/software as an example.
TryHackMe have better examples and explanations, just how I think of it.
We can pick which one we think it is and write a little report. There are some useful headers in there already for us but I felt like it was missing one. A header about what it all means. As is, with all the details taken onboard, what does it mean: Was there damages? Was there an actual breach? Is this something to be concerned about?
I think what happens next is once you find a True Positive and post it, that then completes this particular simulation with a wrap up at the end that might look like my first attempt:
I wrote a little Linkedin post about it here:
TLDR: I took my sweet time, learned a lot, had fun and would recommend.
The real skills that we are developing here are extracting information, finding the story of what’s happened, understanding it, elevating it if we have to and being coherent enough to write about it so that others may understand also.
I found the reporting the most valuable part of this exercise.
There are only 2 simulations available for free (or is it premium subscribers?).
I do wish I had access to some other scenarios!
If you are new the SOC space like I am, I think these offer a great opportunity to step into the shoes of a SOC Analyst and try out looking at events, understanding them and writing about them.
A thumbs up from me! 👍
Subscribe to my newsletter
Read articles from Forrest Caffray directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Forrest Caffray
Forrest Caffray
I spend my days studying cyber security. I am a happy self-learner looking to expand my knowledge and have fun with CTF's and such. I like meeting new people and I'm looking for work.