Skip to content

Latest commit

Β 

History

History

Room

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Completed Rooms


image

Learn Network Security and Traffic Analysis foundations and take a step into probing network anomalies.


image

Explore different OSINT tools used to conduct security threat assessments and investigations.


image

Understand how antivirus software works and what detection techniques are used to bypass malicious files checks.


  • Physical Security Intro image

    This room is an introduction to physical security methods to bypass locks, doors and other physical barriers.

    • Task 1 Introduction
    • Task 2 Overt, Covert, and Surreptitious Entry
    • Task 3 Lock Picking
    • Task 4 Lock Anatomy
    • Task 5 Padlock Bypassing
    • Task 6 Hardware Bypassing
    • Task 7 Credits and More Resources

  • Printer Hacking 101 image

    Learn about (and get hands on with) printer hacking and understand the basics of IPP.

    • Task 1 Unit 1 - Introduction
    • Task 2 Unit 2: IPP Port
    • Task 3 Unit 3: Targeting & Exploitation
    • Task 4 Unit 4 - Conclusion

  • MAL: Researching image

    Understanding checksums, how to generate them and their use throughout malware analysis with online sandboxing & reporting services

    • Task 1 Intro
    • Task 2 Deploy!
    • Task 3 Checksums 101
    • Task 4 Online Sandboxing
    • Task 5 Practical: Calculating & Reporting Checksums
    • Task 6 VirusTotal
    • Task 7 Future Reading (References)

  • Intro to IoT Pentesting image

    A beginner friendly walkthrough for internet of things (IoT) pentesting.

    • Task 1 Foreword
    • Task 2 A little theory
    • Task 3 Connecting to the machine
    • Task 4 Unpacking the firmware
    • Task 5 Attacking the application
    • Task 6 Personal thoughts

  • Bolt image

    A hero is unleashed

    • Task 1 Deploy the machine
    • Task 2 Hack your way into the machine!

  • LFI Basics image

    Learn the basics of local file inclusion

    • Task 1 Local File Inclusion
    • Task 2 Local File Inclusion using Directory Traversal
    • Task 3 Reaching RCE using LFI and log poisoning

  • Android Hacking 101 image

    Android Mobile Application Penetration Testing

    • Task 1 Introduction
    • Task 2 Setup the environment
    • Task 3 Methodology
    • Task 4 Information Gathering
    • Task 5 Reversing
    • Task 6 Static analysis
    • Task 7 Static analysis – Complications
    • Task 8 Dynamic Analysis
    • Task 9 Dynamic Analysis – Complications
    • Task 10 Bypass - Complications in Dynamic Analysis
    • Task 11 Final

  • AttackerKB image

    Learn how to leverage AttackerKB and learn about exploits in your workflow!

    • Task 1 I'm attacking what now?
    • Task 2 Discovering the Lay of the Land
    • Task 3 Learning to Fly
    • Task 4 Blasting Away
    • Task 5 Going Further

  • Injection image

    Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers

    • Task 1 Introduction & Deploy
    • Task 2 An Introduction To Command Injection
    • Task 3 Blind Command Injection
    • Task 4 Active Command Injection
    • Task 5 Get The Flag!

  • Post-Exploitation Basics image

    Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom

    • Task 1 Introduction
    • Task 2 Enumeration w/ Powerview
    • Task 3 Enumeration w/ Bloodhound
    • Task 4 Dumping hashes w/ mimikatz
    • Task 5 Golden Ticket Attacks w/ mimikatz
    • Task 6 Enumeration w/ Server Manager
    • Task 7 Maintaining Access
    • Task 8 Conclusion

  • Introduction to OWASP ZAP image

    Learn how to use OWASP ZAP from the ground up. An alternative to BurpSuite.

    • Task 1 Intro to ZAP
    • Task 2 Disclaimer
    • Task 3 Installation
    • Task 4 How to perform an automated scan
    • Task 5 Manual Scanning
    • Task 6 Scanning an Authenticated Web Application
    • Task 7 Brute-force Directories
    • Task 8 Bruteforce Web Login
    • Task 9 ZAP Extensions
    • Task 10 Further Reading

  • Dumping Router Firmware image

    Have you ever been curious about how your router works? What OS it runs? What makes it tick?

    • Task 1 Preparation
    • Task 2 Investigating Firmware
    • Task 3 Mounting and Analysis of the Router's Filesystem

  • MAL: Malware Introductory image

    The start of a series of rooms covering Malware Analysis...

    • Task 1 What is the Purpose of Malware Analysis?
    • Task 2 Understanding Malware Campaigns
    • Task 3 Identifying if a Malware Attack has Happened
    • Task 4 Static Vs. Dynamic Analysis
    • Task 5 Discussion of Provided Tools & Their Uses
    • Task 6 Connecting to the Windows Analysis Environment (Deploy)
    • Task 7 Obtaining MD5 Checksums of Provided Files
    • Task 8 Now lets see if the MD5 Checksums have been analysed before
    • Task 9 Identifying if the Executables are obfuscated / packed
    • Task 10 What is Obfuscation / Packing?
    • Task 11 Visualising the Differences Between Packed & Non-Packed Code
    • Task 12 Introduction to Strings
    • Task 13 Introduction to Imports
    • Task 14 Practical Summary

  • Volatility image

    Learn how to perform memory forensics with Volatility!

    • Task 1 Intro
    • Task 2 Obtaining Memory Samples
    • Task 3 Examining Our Patient
    • Task 4 Post Actions
    • Task 5 Extra Credit

  • hackerNote image

    A custom webapp, introducing username enumeration, custom wordlists and a basic privilege escalation exploit.

    • Task 1 Reconnaissance
    • Task 2 Investigate
    • Task 3 Exploit
    • Task 4 Attack Passwords
    • Task 5 Escalate
    • Task 6 Comments on realism and Further Reading

  • Shodan.io image

    Learn about Shodan.io and how to use it for devices enumeration - is your coffee machine publicly accessible?

    • Task 1 Introduction
    • Task 2 Filters
    • Task 3 Google & Filtering
    • Task 4 Shodan Monitor
    • Task 5 Shodan Dorking
    • Task 6 Shodan Extension
    • Task 7 Exploring the API & Conclusion

  • Jupyter 101 image

    A friendly introduction into using the Jupyter Notebook environment. Learn to process and visualise data!

    • Task 1 Preface
    • Task 2 What is Jupyter?
    • Task 3 Deploying Instance & Logging In
    • Task 4 Let's Learn More About Jupyter
    • Task 5 Understanding how Jupyter Notebooks Run
    • Task 6 Interacting With the Filesystem!
    • Task 7 Handling Data With Pandas
    • Task 8 Visualising Data With Matplotlib

  • Empire image

    Learn how to use Empire and it's GUI Starkiller, a powerful post-exploitation C2 framework.

    • Task 1 Introduction
    • Task 2 Deploy!
    • Task 3 Installation
    • Task 4 Menu Overview
    • Task 5 Listeners
    • Task 6 Stagers
    • Task 7 Agents
    • Task 8 Modules
    • Task 9 Plugins
    • Task 10 Conclusion

  • Phishing: HiddenEye image

    A simple guide on how to use a tool known as HiddenEye developed by ANONUD4Y. This tool helps you create a phishing page for different sites such as Gmail, Snapchat, Paypal and more. Including understanding the difference between legit and fake site.

    • Task 1 Installation & Creating your first phishing page !
    • Task 2 Masking Your Link.
    • Task 3 Creating Gmail Phishing Page !

  • Sublist3r image

    Learn how to find subdomains with Sublist3r!

    • Task 1 Intro
    • Task 2 Installation
    • Task 3 Switchboard
    • Task 4 Scans away!

image

  • Geolocating Images

    Room to understand how to geolocate images

    • Task 1 Getting Started
    • Task 2 Getting our feet wet - where is this?
    • Task 3 Geolocating Images 101
    • Task 4 Now your turn
    • Task 5 Helpful tips for geolocating
    • Task 6 Your turn, again!
    • Task 7 Your turn, what can you see?
    • Task 8 You're done!

image

  • Wifi Hacking 101

    Learn to attack WPA(2) networks! Ideally you'll want a smartphone with you for this, preferably one that supports hosting wifi hotspots so you can follow along.

    • Task 1 The basics - An Intro to WPA
    • Task 2 You're being watched - Capturing packets to attack
    • Task 3 Aircrack-ng - Let's Get Cracking

image

  • DVWA

    Basic room for testing exploits against the Damn Vulnerable Web Application box

    • Task 1 DVWA

image

  • CC: Pen Testing

    A crash course on various topics in penetration testing

    • Task 1 Introduction
    • Task 2 [Section 1 - Network Utilities] - nmap
    • Task 3 [Section 1 - Network Utilities] - Netcat
    • Task 4 [Section 2 - Web Enumeration] - gobuster
    • Task 5 [Section 2 - Web Enumeration] - nikto
    • Task 6 [Section 3 - Metasploit]: Intro
    • Task 7 [Section 3 Metasploit]: Setting Up
    • Task 8 [Section 3 - Metasploit]: - Selecting a module
    • Task 9 [Section 3 - Metasploit]: meterpreter
    • Task 10 [Section 3 - Metasploit]: Final Walkthrough
    • Task 11 [Section 4 - Hash Cracking]: Intro
    • Task 12 [Section 4 - Hash Cracking]: Salting and Formatting
    • Task 13 [Section 4 - Hash Cracking]: hashcat
    • Task 14 [Section 4 - Hash Cracking]: John The Ripper
    • Task 15 [Section 5 - SQL Injection]: Intro
    • Task 16 [Section 5 - SQL Injection]: sqlmap
    • Task 17 [Section 5 - SQL Injection]: A Note on Manual SQL Injection
    • Task 18 [Section 5 - SQL Injection]: Vulnerable Web Application
    • Task 19 [Section 6 - Samba]: Intro
    • Task 20 [Section 6 - Samba]: smbmap
    • Task 21 [Section 6 - Samba]: smbclient
    • Task 22 [Section 6 - Samba]: A note about impacket
    • Task 23 [Miscellaneous]: A note on privilege escalation
    • Task 24 [Section 7 - Final Exam]: Good Luck :D

image

  • Toolbox: Vim

    Learn vim, a universal text editor that can be incredibly powerful when used properly. From basic text editing to editing of binary files, Vim can be an important arsenal in a security toolkit.

    • Task 1 Task 1
    • Task 2 Task 2
    • Task 3 Task 3
    • Task 4 Task 4
    • Task 5 Task 5

image

  • Solar, exploiting log4j

    Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.

    • Task 1 CVE-2021-44228 Introduction
    • Task 2 Reconnaissance
    • Task 3 Discovery
    • Task 4 Proof of Concept
    • Task 5 Exploitation
    • Task 6 Persistence
    • Task 7 Detection
    • Task 8 Bypasses
    • Task 9 Mitigation
    • Task 10 Patching
    • Task 11 Credits and Author's Notes

image

  • Linux Strength Training

    Guided room for beginners to learn/reinforce linux command line skills

    • Task 1 Intro
    • Task 2 Finding your way around linux - overview
    • Task 3 Working with files
    • Task 4 Hashing - introduction
    • Task 5 Decoding base64
    • Task 6 Encryption/Decryption using gpg
    • Task 7 Cracking encrypted gpg files
    • Task 8 Reading SQL databases
    • Task 9 Final Challenge

image

  • ffuf

    Enumeration, fuzzing, and directory brute forcing using ffuf

    • Task 1 Info Introduction
    • Task 2 Walkthrough Basics
    • Task 3 Walkthrough Finding pages and directories
    • Task 4 Walkthrough Using filters
    • Task 5 Walkthrough Fuzzing parameters
    • Task 6 Walkthrough Finding vhosts and subdomains
    • Task 7 Walkthrough Proxifying ffuf traffic
    • Task 8 Questions Reviewing the options
    • Task 9 Info About the author