You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Malicious Infrastructure: pt-br translation of Module 10 (Merge #18)
Other changes include:
• Inclusion of screenshots in Brazilian Portuguese to emphasize certain actions (e.g. "Copiar Link");
• Improvements to images universally used across different translations of Module 10 (e.g. victimID highlight);
• Renaming two image files that were named CFT instead of CTF.
Copy file name to clipboardExpand all lines: content/learning-path/1/module-10.ar.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ In this walkthrough we will just open the email (paypal.eml) in an email program
35
35
36
36
As we look into the email, we see the visible sender email address
37
37
38
-

38
+

Copy file name to clipboardExpand all lines: content/learning-path/1/module-10.en.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ In this walkthrough we will just open the email (paypal.eml) in an email program
35
35
36
36
As we look into the email, we see the visible sender email address
37
37
38
-

38
+

39
39
{{< /question >}}
40
40
41
41
{{< question title="Answer" >}}
@@ -60,7 +60,7 @@ Here are some key trigger points to watch out for in a phishing email:
60
60
{{< /question >}}
61
61
62
62
{{< question title="Answer" >}}
63
-
The email subject line is: _We called you and you didn't answer_
63
+
The email subject line is: _We called you, you didn't answer_
64
64
{{< /question >}}
65
65
66
66
### Question 3: What is the action requested?
@@ -86,7 +86,7 @@ As we go deeper in the analysis, the first step to do is to understand the diffe
86
86
{{< /question >}}
87
87
88
88
{{< question title="Hints" >}}
89
-
You can defang a link in a text editor. Here we will use [CyberChef](gchq.github.io/CyberChef) to defang the URL as we will use CyberChef for other steps as well. CyberChef is a web application with a huge number of functions which can help you with analyzing security-related data. Here’s a [very brief introduction](https://udel.codes/cyberchef.html) to its layout and functions.
89
+
You can defang a link in a text editor. Here we will use [CyberChef](https://gchq.github.io/CyberChef) to defang the URL as we will use CyberChef for other steps as well. CyberChef is a web application with a huge number of functions which can help you with analyzing security-related data. Here’s a [very brief introduction](https://udel.codes/cyberchef.html) to its layout and functions.
90
90
91
91
As part of this exercise, play around with CyberChef and defang the “please confirm” link from the attached email.
92
92
@@ -204,13 +204,13 @@ Once you press “Analyze Header”, you can see the return path
204
204
{{< /question >}}
205
205
206
206
{{< question title="Answer" >}}
207
-
paparazi@rjttznyzjjzydnillquh.designclub.uk.com
207
+
`paparazi@rjttznyzjjzydnillquh.designclub.uk.com`
208
208
{{< /question >}}
209
209
210
210
### Question 12: What are the first hop and SMTP server address of that email?
211
211
212
212
{{< question title="Instructions" open="true" >}}
213
-
Go to the file “mx-toolbox-header-analysis”, look into the relay information section.
213
+
Go to the file `mx-toolbox-header-analysis.pdf`, look into the relay information section.
214
214
215
215

216
216
The address of the mail server
@@ -246,11 +246,13 @@ we search for the victimID in the source code
246
246
247
247
Then we can paste the value we discovered into CyberChef. The tool has a magic wand feature which automatically detects and converts encoding–we could use that!
248
248
249
-

249
+

250
250
251
251
Yay! The magic wand detected that the input is encoded with Base64 and decoded it automatically, giving us the answer!
252
252
253
-

253
+

0 commit comments