- Task 1 Introduction
- Task 2 Network Security and Network Data
- Task 3 Traffic Analysis
- Task 4 Conclusion
- Task 1 Room Outline
- Task 2 Threat Intelligence
- Task 3 UrlScan.io
- Task 4 Abuse.ch
- Task 5 PhishTool
- Task 6 Cisco Talos Intelligence
- Task 7 Scenario 1
- Task 8 Scenario 2
- Task 9 Conclusion
Understand how antivirus software works and what detection techniques are used to bypass malicious files checks.
- Task 1 Introduction
- Task 2 Antivirus Software
- Task 3 Antivirus Features
- Task 4 Deploy the VM
- Task 5 AV Static Detection
- Task 6 Other Detection Techniques
- Task 7 AV Testing and Fingerprinting
- Task 8 Conclusion
- Physical Security Intro
This room is an introduction to physical security methods to bypass locks, doors and other physical barriers.
- Task 1 Introduction
- Task 2 Overt, Covert, and Surreptitious Entry
- Task 3 Lock Picking
- Task 4 Lock Anatomy
- Task 5 Padlock Bypassing
- Task 6 Hardware Bypassing
- Task 7 Credits and More Resources
- Printer Hacking 101
Learn about (and get hands on with) printer hacking and understand the basics of IPP.
- Task 1 Unit 1 - Introduction
- Task 2 Unit 2: IPP Port
- Task 3 Unit 3: Targeting & Exploitation
- Task 4 Unit 4 - Conclusion
- MAL: Researching
Understanding checksums, how to generate them and their use throughout malware analysis with online sandboxing & reporting services
- Task 1 Intro
- Task 2 Deploy!
- Task 3 Checksums 101
- Task 4 Online Sandboxing
- Task 5 Practical: Calculating & Reporting Checksums
- Task 6 VirusTotal
- Task 7 Future Reading (References)
- Intro to IoT Pentesting
A beginner friendly walkthrough for internet of things (IoT) pentesting.
- Task 1 Foreword
- Task 2 A little theory
- Task 3 Connecting to the machine
- Task 4 Unpacking the firmware
- Task 5 Attacking the application
- Task 6 Personal thoughts
- Bolt
A hero is unleashed
- Task 1 Deploy the machine
- Task 2 Hack your way into the machine!
- LFI Basics
Learn the basics of local file inclusion
- Task 1 Local File Inclusion
- Task 2 Local File Inclusion using Directory Traversal
- Task 3 Reaching RCE using LFI and log poisoning
- Android Hacking 101
Android Mobile Application Penetration Testing
- Task 1 Introduction
- Task 2 Setup the environment
- Task 3 Methodology
- Task 4 Information Gathering
- Task 5 Reversing
- Task 6 Static analysis
- Task 7 Static analysis β Complications
- Task 8 Dynamic Analysis
- Task 9 Dynamic Analysis β Complications
- Task 10 Bypass - Complications in Dynamic Analysis
- Task 11 Final
- AttackerKB
Learn how to leverage AttackerKB and learn about exploits in your workflow!
- Task 1 I'm attacking what now?
- Task 2 Discovering the Lay of the Land
- Task 3 Learning to Fly
- Task 4 Blasting Away
- Task 5 Going Further
- Injection
Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers
- Task 1 Introduction & Deploy
- Task 2 An Introduction To Command Injection
- Task 3 Blind Command Injection
- Task 4 Active Command Injection
- Task 5 Get The Flag!
- Post-Exploitation Basics
Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom
- Task 1 Introduction
- Task 2 Enumeration w/ Powerview
- Task 3 Enumeration w/ Bloodhound
- Task 4 Dumping hashes w/ mimikatz
- Task 5 Golden Ticket Attacks w/ mimikatz
- Task 6 Enumeration w/ Server Manager
- Task 7 Maintaining Access
- Task 8 Conclusion
- Introduction to OWASP ZAP
Learn how to use OWASP ZAP from the ground up. An alternative to BurpSuite.
- Task 1 Intro to ZAP
- Task 2 Disclaimer
- Task 3 Installation
- Task 4 How to perform an automated scan
- Task 5 Manual Scanning
- Task 6 Scanning an Authenticated Web Application
- Task 7 Brute-force Directories
- Task 8 Bruteforce Web Login
- Task 9 ZAP Extensions
- Task 10 Further Reading
- Dumping Router Firmware
Have you ever been curious about how your router works? What OS it runs? What makes it tick?
- Task 1 Preparation
- Task 2 Investigating Firmware
- Task 3 Mounting and Analysis of the Router's Filesystem
- MAL: Malware Introductory
The start of a series of rooms covering Malware Analysis...
- Task 1 What is the Purpose of Malware Analysis?
- Task 2 Understanding Malware Campaigns
- Task 3 Identifying if a Malware Attack has Happened
- Task 4 Static Vs. Dynamic Analysis
- Task 5 Discussion of Provided Tools & Their Uses
- Task 6 Connecting to the Windows Analysis Environment (Deploy)
- Task 7 Obtaining MD5 Checksums of Provided Files
- Task 8 Now lets see if the MD5 Checksums have been analysed before
- Task 9 Identifying if the Executables are obfuscated / packed
- Task 10 What is Obfuscation / Packing?
- Task 11 Visualising the Differences Between Packed & Non-Packed Code
- Task 12 Introduction to Strings
- Task 13 Introduction to Imports
- Task 14 Practical Summary
- Volatility
Learn how to perform memory forensics with Volatility!
- Task 1 Intro
- Task 2 Obtaining Memory Samples
- Task 3 Examining Our Patient
- Task 4 Post Actions
- Task 5 Extra Credit
- hackerNote
A custom webapp, introducing username enumeration, custom wordlists and a basic privilege escalation exploit.
- Task 1 Reconnaissance
- Task 2 Investigate
- Task 3 Exploit
- Task 4 Attack Passwords
- Task 5 Escalate
- Task 6 Comments on realism and Further Reading
- Shodan.io
Learn about Shodan.io and how to use it for devices enumeration - is your coffee machine publicly accessible?
- Task 1 Introduction
- Task 2 Filters
- Task 3 Google & Filtering
- Task 4 Shodan Monitor
- Task 5 Shodan Dorking
- Task 6 Shodan Extension
- Task 7 Exploring the API & Conclusion
- Jupyter 101
A friendly introduction into using the Jupyter Notebook environment. Learn to process and visualise data!
- Task 1 Preface
- Task 2 What is Jupyter?
- Task 3 Deploying Instance & Logging In
- Task 4 Let's Learn More About Jupyter
- Task 5 Understanding how Jupyter Notebooks Run
- Task 6 Interacting With the Filesystem!
- Task 7 Handling Data With Pandas
- Task 8 Visualising Data With Matplotlib
- Empire
Learn how to use Empire and it's GUI Starkiller, a powerful post-exploitation C2 framework.
- Task 1 Introduction
- Task 2 Deploy!
- Task 3 Installation
- Task 4 Menu Overview
- Task 5 Listeners
- Task 6 Stagers
- Task 7 Agents
- Task 8 Modules
- Task 9 Plugins
- Task 10 Conclusion
- Phishing: HiddenEye
A simple guide on how to use a tool known as HiddenEye developed by ANONUD4Y. This tool helps you create a phishing page for different sites such as Gmail, Snapchat, Paypal and more. Including understanding the difference between legit and fake site.
- Task 1 Installation & Creating your first phishing page !
- Task 2 Masking Your Link.
- Task 3 Creating Gmail Phishing Page !
- Sublist3r
Learn how to find subdomains with Sublist3r!
- Task 1 Intro
- Task 2 Installation
- Task 3 Switchboard
- Task 4 Scans away!
- Geolocating Images
Room to understand how to geolocate images
- Task 1 Getting Started
- Task 2 Getting our feet wet - where is this?
- Task 3 Geolocating Images 101
- Task 4 Now your turn
- Task 5 Helpful tips for geolocating
- Task 6 Your turn, again!
- Task 7 Your turn, what can you see?
- Task 8 You're done!
- Wifi Hacking 101
Learn to attack WPA(2) networks! Ideally you'll want a smartphone with you for this, preferably one that supports hosting wifi hotspots so you can follow along.
- Task 1 The basics - An Intro to WPA
- Task 2 You're being watched - Capturing packets to attack
- Task 3 Aircrack-ng - Let's Get Cracking
- DVWA
Basic room for testing exploits against the Damn Vulnerable Web Application box
- Task 1 DVWA
- CC: Pen Testing
A crash course on various topics in penetration testing
- Task 1 Introduction
- Task 2 [Section 1 - Network Utilities] - nmap
- Task 3 [Section 1 - Network Utilities] - Netcat
- Task 4 [Section 2 - Web Enumeration] - gobuster
- Task 5 [Section 2 - Web Enumeration] - nikto
- Task 6 [Section 3 - Metasploit]: Intro
- Task 7 [Section 3 Metasploit]: Setting Up
- Task 8 [Section 3 - Metasploit]: - Selecting a module
- Task 9 [Section 3 - Metasploit]: meterpreter
- Task 10 [Section 3 - Metasploit]: Final Walkthrough
- Task 11 [Section 4 - Hash Cracking]: Intro
- Task 12 [Section 4 - Hash Cracking]: Salting and Formatting
- Task 13 [Section 4 - Hash Cracking]: hashcat
- Task 14 [Section 4 - Hash Cracking]: John The Ripper
- Task 15 [Section 5 - SQL Injection]: Intro
- Task 16 [Section 5 - SQL Injection]: sqlmap
- Task 17 [Section 5 - SQL Injection]: A Note on Manual SQL Injection
- Task 18 [Section 5 - SQL Injection]: Vulnerable Web Application
- Task 19 [Section 6 - Samba]: Intro
- Task 20 [Section 6 - Samba]: smbmap
- Task 21 [Section 6 - Samba]: smbclient
- Task 22 [Section 6 - Samba]: A note about impacket
- Task 23 [Miscellaneous]: A note on privilege escalation
- Task 24 [Section 7 - Final Exam]: Good Luck :D
- Toolbox: Vim
Learn vim, a universal text editor that can be incredibly powerful when used properly. From basic text editing to editing of binary files, Vim can be an important arsenal in a security toolkit.
- Task 1 Task 1
- Task 2 Task 2
- Task 3 Task 3
- Task 4 Task 4
- Task 5 Task 5
- Solar, exploiting log4j
Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
- Task 1 CVE-2021-44228 Introduction
- Task 2 Reconnaissance
- Task 3 Discovery
- Task 4 Proof of Concept
- Task 5 Exploitation
- Task 6 Persistence
- Task 7 Detection
- Task 8 Bypasses
- Task 9 Mitigation
- Task 10 Patching
- Task 11 Credits and Author's Notes
- Linux Strength Training
Guided room for beginners to learn/reinforce linux command line skills
- Task 1 Intro
- Task 2 Finding your way around linux - overview
- Task 3 Working with files
- Task 4 Hashing - introduction
- Task 5 Decoding base64
- Task 6 Encryption/Decryption using gpg
- Task 7 Cracking encrypted gpg files
- Task 8 Reading SQL databases
- Task 9 Final Challenge
- ffuf
Enumeration, fuzzing, and directory brute forcing using ffuf
- Task 1
Info
Introduction - Task 2
Walkthrough
Basics - Task 3
Walkthrough
Finding pages and directories - Task 4
Walkthrough
Using filters - Task 5
Walkthrough
Fuzzing parameters - Task 6
Walkthrough
Finding vhosts and subdomains - Task 7
Walkthrough
Proxifying ffuf traffic - Task 8
Questions
Reviewing the options - Task 9
Info
About the author
- Task 1