
Jul 15, 2025
What is Phishing? Introduction to Phishing Demo (for Beginners)
Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering.
Think you can spot a phishing email? Think again!
In this animated walkthrough, part of OffSec’s Phishing Awareness module from our Cybersecurity Survival Guide learning path, we give you a front-row seat to how attackers think and operate. From social engineering to spoofed login pages, see how one bad click can turn into a big problem. We’ll also show you how attackers use these techniques to compromise individuals and organizations.
Follow “Bad Luck Ben” and “Technical Tina” as they uncover a real-world scenario inside MegaCorp One. You’ll learn:
🔍 How phishing attacks are crafted and executed
🎣 What attackers are looking for (hint: it’s more than your password)
⚠️ The warning signs of suspicious emails and URLs
💡 Pro tips to protect yourself and your organization
This is video-based content, aimed at a non-technical audience.
The first video (Phishing Awareness) is a prototype and we’d like your feedback in a brief survey. Please click below to open a Google survey in a new tab. We promise this isn’t a phishing attempt. 😉 Your response is greatly appreciated!
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
What is Phishing? Introduction to Phishing Demo (for Beginners)
Learn how phishing attacks work and how to spot them. Watch OffSec’s animated video to protect yourself from scams, spoofed sites, and social engineering.
Jul 15, 2025
2 min read

Research & Tutorials
CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass
Discover the critical Apache Camel vulnerability (CVE-2025-27636) that allows remote code execution via case-sensitive HTTP header manipulation in the exec component. Learn how attackers exploit this flaw and how to mitigate it.
Jul 10, 2025
2 min read

Research & Tutorials
CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection
Discover details about CVE-2025-29306, a critical RCE vulnerability in FoxCMS 1.2.5. Learn how unsafe use of PHP’s unserialize() function enables remote attackers to execute arbitrary system commands.
Jul 3, 2025
2 min read