Security Lab

Learn by seeing risk before it becomes an incident.

This is a safe educational environment built by THWS. No live phishing attacks, no real DNS rerouting, and no collection of sensitive visitor data.

Did You Know?

One misleading link can bypass good intentions.

Attackers often use trusted language, urgent timing, and lookalike domains. Click the dummy link below to see how that pattern works.

View Urgent Account Notice (Demo)

Phishing Test

Can you spot the warning signs?

"IT Security: Verify your password in 15 minutes to avoid lockout."

Sender: it-support@secure-microsoft-helpdesk.com

"Quarterly security review reminder from your existing internal portal."

Sender: security@yourcompany.com, link points to known domain over HTTPS.

"School device update: install this profile now for your child."

Unexpected profile request from an unknown sender domain.

DNS Reroute Demo

See normal vs hijacked vs protected DNS flow.

User Device
->
DNS Resolver
->
Requested Site

Normal flow: your request resolves through expected DNS infrastructure to the intended destination.

Why It Matters

Your service is built to prevent these failures.

Lab FAQ

Quick answers for visitors and clients

Is the Security Lab doing real attacks?

No. It is a controlled educational simulation designed to teach risk patterns in a safe way.

Why include a phishing test?

Human behavior is part of security. The test shows how urgency and spoofed identity can trick users without layered controls.

What does DNS protection do in practice?

It validates resolution paths, applies policy controls, and helps route requests toward trusted destinations instead of malicious lookalikes.