Overview

This project demonstrates a controlled phishing analysis workflow inside an isolated virtual environment.
The lab simulates safe investigation of suspicious URLs and phishing artifacts without exposing the host system.

Lab Architecture

  • Host System: Windows 11
  • Virtual Environment: VirtualBox (Ubuntu / Kali Linux)
  • Network Mode: NAT / Host-Only isolation
  • Traffic Monitoring: Wireshark (PCAP capture)
  • Manual Analysis Tools: Browser DevTools, curl, dig, whois

Investigation Workflow

  1. Suspicious URL initial inspection
  2. Domain and DNS reconnaissance (WHOIS / dig)
  3. Controlled detonation inside isolated VM
  4. Network traffic capture and PCAP analysis
  5. JavaScript and HTML source code review
  6. IOC extraction (IPs, domains, URLs, hashes)
  7. Structured incident documentation

Artifacts Collected

  • PCAP file
  • Extracted malicious domains
  • Suspicious IP addresses
  • HTTP request patterns
  • Incident report template

Traffic Analysis Evidence

DNS resolution of suspicious domain inside isolated VM environment

SNI field confirms the requested domain before encryption begins

Detection & Monitoring Considerations

During analysis the following detection opportunities were identified:

  • DNS monitoring for newly registered or suspicious domains
  • Detection of abnormal outbound HTTP requests
  • Monitoring unusual User-Agent strings
  • Detection of suspicious IP communication patterns
  • Proxy log correlation with DNS queries
  • SIEM correlation between DNS → HTTP → IP indicators

Mitigation Recommendations

  • Block identified malicious domains and IPs at firewall level
  • Add IOCs to DNS filtering solution (Pi-hole / enterprise DNS)
  • Implement outbound traffic monitoring
  • Apply browser security policies
  • Conduct user awareness training

Key Skills Demonstrated

  • Safe malware detonation procedures
  • Network traffic analysis
  • IOC identification and extraction
  • Incident documentation
  • Analytical workflow discipline

Lessons Learned

  • Importance of VM isolation
  • Value of packet-level inspection
  • Pattern recognition in phishing infrastructure
  • Importance of structured documentation
Scroll to Top