mirror of
https://github.com/cliffe/HacktivityLabSheets.git
synced 2026-02-21 19:28:04 +00:00
lab updates
This commit is contained in:
@@ -1,3 +1,24 @@
|
||||
---
|
||||
title: "Introduction to Linux and Security"
|
||||
author: "Z. Cliffe Schreuders"
|
||||
description: "Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux."
|
||||
difficulty: "Beginner"
|
||||
duration: "90 minutes"
|
||||
prerequisites: "Basic computer skills"
|
||||
tags: ["linux", "command-line", "ssh", "kali", "networking", "security"]
|
||||
lab_sheet_url: "https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing"
|
||||
type: ["ctf-lab", "lab-sheet"]
|
||||
lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_1_Intro_to_Unix_FOSS_and_Linux.html"
|
||||
reading: "Chapters 1-2: Practical Unix and Internet Security by Garfinkel, Spafford, and Schwartz"
|
||||
cybok:
|
||||
- ka: "NS"
|
||||
topic: "Network Protocols and Vulnerability"
|
||||
keywords: ["common network attacks"]
|
||||
- ka: "SOIM"
|
||||
topic: "PENETRATION TESTING"
|
||||
keywords: ["PENETRATION TESTING - SOFTWARE TOOLS"]
|
||||
---
|
||||
|
||||
# Introduction to Linux and security tools
|
||||
|
||||
### License {#preparation-and-logging-in}
|
||||
|
||||
@@ -1,3 +1,30 @@
|
||||
---
|
||||
title: "Malware and an Introduction to Metasploit and Payloads"
|
||||
author: "Z. Cliffe Schreuders"
|
||||
description: "Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment."
|
||||
difficulty: "Beginner"
|
||||
duration: "120 minutes"
|
||||
prerequisites: "Basic understanding of operating systems and networking"
|
||||
tags: ["malware", "metasploit", "payloads", "trojan", "ethical-hacking", "penetration-testing"]
|
||||
lab_sheet_url: "https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing"
|
||||
type: ["lab-sheet"]
|
||||
lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html"
|
||||
reading: "Chapter 23: Protecting Against Programmed Threats - Practical Unix and Internet Security"
|
||||
cybok:
|
||||
- ka: "MAT"
|
||||
topic: "Malware Taxonomy"
|
||||
keywords: ["dimensions", "kinds"]
|
||||
- ka: "MAT"
|
||||
topic: "Malware Analysis"
|
||||
keywords: ["anti-analysis and evasion techniques"]
|
||||
- ka: "MAT"
|
||||
topic: "Attacks and exploitation"
|
||||
keywords: ["EXPLOITATION FRAMEWORKS"]
|
||||
- ka: "SOIM"
|
||||
topic: "PENETRATION TESTING"
|
||||
keywords: ["PENETRATION TESTING - SOFTWARE TOOLS", "PENETRATION TESTING - ACTIVE PENETRATION"]
|
||||
---
|
||||
|
||||
# Malware and an Introduction to Metasploit and Payloads
|
||||
|
||||
### License {#preparation}
|
||||
Reference in New Issue
Block a user