Skip to content

Commit 64d963f

Browse files
Malicious Infrastructure: pt-br translation of Module 10 (Merge #18)
Other changes include: • Inclusion of screenshots in Brazilian Portuguese to emphasize certain actions (e.g. "Copiar Link"); • Improvements to images universally used across different translations of Module 10 (e.g. victimID highlight); • Renaming two image files that were named CFT instead of CTF.
2 parents 53ad212 + 6279f22 commit 64d963f

13 files changed

+278
-8
lines changed

content/learning-path/1/module-10.ar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this walkthrough we will just open the email (paypal.eml) in an email program
3535

3636
As we look into the email, we see the visible sender email address
3737

38-
![Image of an ostensible email from Paypal indicating suspicious account activity with a link to verify the account. The email is from paypal@service.com](/media/uploads/CFT2_sender_address.png)
38+
![Image of an ostensible email from Paypal indicating suspicious account activity with a link to verify the account. The email is from paypal@service.com](/media/uploads/CTF2_sender_address.png)
3939
{{< /question >}}
4040

4141
{{< question title="Answer" >}}

content/learning-path/1/module-10.en.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this walkthrough we will just open the email (paypal.eml) in an email program
3535

3636
As we look into the email, we see the visible sender email address
3737

38-
![Image of an ostensible email from Paypal indicating suspicious account activity with a link to verify the account. The email is from paypal@service.com](/media/uploads/CFT2_sender_address.png)
38+
![Image of an ostensible email from Paypal indicating suspicious account activity with a link to verify the account. The email is from paypal@service.com](/media/uploads/CTF2_sender_address.png)
3939
{{< /question >}}
4040

4141
{{< question title="Answer" >}}
@@ -60,7 +60,7 @@ Here are some key trigger points to watch out for in a phishing email:
6060
{{< /question >}}
6161

6262
{{< question title="Answer" >}}
63-
The email subject line is: _We called you and you didn't answer_
63+
The email subject line is: _We called you, you didn't answer_
6464
{{< /question >}}
6565

6666
### Question 3: What is the action requested?
@@ -86,7 +86,7 @@ As we go deeper in the analysis, the first step to do is to understand the diffe
8686
{{< /question >}}
8787

8888
{{< question title="Hints" >}}
89-
You can defang a link in a text editor. Here we will use [CyberChef](gchq.github.io/CyberChef) to defang the URL as we will use CyberChef for other steps as well. CyberChef is a web application with a huge number of functions which can help you with analyzing security-related data. Here’s a [very brief introduction](https://udel.codes/cyberchef.html) to its layout and functions.
89+
You can defang a link in a text editor. Here we will use [CyberChef](https://gchq.github.io/CyberChef) to defang the URL as we will use CyberChef for other steps as well. CyberChef is a web application with a huge number of functions which can help you with analyzing security-related data. Here’s a [very brief introduction](https://udel.codes/cyberchef.html) to its layout and functions.
9090

9191
As part of this exercise, play around with CyberChef and defang the “please confirm” link from the attached email.
9292

@@ -204,13 +204,13 @@ Once you press “Analyze Header”, you can see the return path
204204
{{< /question >}}
205205

206206
{{< question title="Answer" >}}
207-
paparazi@rjttznyzjjzydnillquh.designclub.uk.com
207+
`paparazi@rjttznyzjjzydnillquh.designclub.uk.com`
208208
{{< /question >}}
209209

210210
### Question 12: What are the first hop and SMTP server address of that email?
211211

212212
{{< question title="Instructions" open="true" >}}
213-
Go to the file mx-toolbox-header-analysis, look into the relay information section.
213+
Go to the file `mx-toolbox-header-analysis.pdf`, look into the relay information section.
214214

215215
![Another screenshot of the MX Toolbox analytics, with an initial relay highlighted](/media/uploads/CTF14_relay.png)
216216
The address of the mail server
@@ -246,11 +246,13 @@ we search for the victimID in the source code
246246

247247
Then we can paste the value we discovered into CyberChef. The tool has a magic wand feature which automatically detects and converts encoding–we could use that!
248248

249-
![A screenshot of CyberChef decoding Base64 input into plain text](/media/uploads/CTF18_cyberchef_result.png)
249+
![A screenshot of CyberChef's magic wand feature](/media/uploads/CTF19_cyberchef_wand.png)
250250

251251
Yay! The magic wand detected that the input is encoded with Base64 and decoded it automatically, giving us the answer!
252252

253-
![A screenshot of CyberChef's magic wand feature](/media/uploads/CTF19_cyberchef_wand.png)
253+
![A screenshot of CyberChef decoding Base64 input into plain text](/media/uploads/CTF18_cyberchef_result.png)
254+
255+
254256
{{< /question >}}
255257

256258
{{< question title="Answer" >}}

content/learning-path/1/module-10.pt-br.md

Lines changed: 268 additions & 0 deletions
Large diffs are not rendered by default.
-143 KB
Binary file not shown.
274 KB
Loading
1.13 MB
Loading
279 KB
Loading
714 KB
Loading
575 KB
Loading
583 KB
Loading

0 commit comments

Comments
 (0)