Visualization Tools Flashcards

1
Q
A

This lesson will cover tools we can use to visualize a malicious URL without actually having to visit the site, as it could be highly malicious. The tools we’re going to cover are URL2PNG and URLScan. By the end of this lesson, you will feel comfortable with visualizing hyperlinks to assess what is on the other side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

URL2PNG

A

URL2PNG is my go-to tool for visualization. You simply enter in a URL, hit go, and it’ll provide you with a screenshot of what the webpage looks like. Let’s go through a couple of examples. The screenshot below shows me entering a malicious URL for a real-world Outlook Web Access credential harvester into the tool:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

URLScan

A

URLScan, amongst other information this tool gathers on a searched URL, has the ability to provide a screenshot. In this example, you can see a screenshot has been taken on the right-hand side, allowing us to see what the destination web page looks like. In this case, it is an Outlook Web App credential harvester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Conclusion

A

Visualization tools are key to allowing analysts to identify what is on the other end of a hyperlink without having to visit the page directly. Whilst it is not necessary to include a screenshot of the destination in your investigation report, it’s something I like to do!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly