lab updates

This commit is contained in:
Z. Cliffe Schreuders
2025-09-15 23:24:20 +01:00
parent bd3857b367
commit c529445d99
2 changed files with 48 additions and 0 deletions

View File

@@ -1,3 +1,24 @@
---
title: "Introduction to Linux and Security"
author: "Z. Cliffe Schreuders"
description: "Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux."
difficulty: "Beginner"
duration: "90 minutes"
prerequisites: "Basic computer skills"
tags: ["linux", "command-line", "ssh", "kali", "networking", "security"]
lab_sheet_url: "https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing"
type: ["ctf-lab", "lab-sheet"]
lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_1_Intro_to_Unix_FOSS_and_Linux.html"
reading: "Chapters 1-2: Practical Unix and Internet Security by Garfinkel, Spafford, and Schwartz"
cybok:
- ka: "NS"
topic: "Network Protocols and Vulnerability"
keywords: ["common network attacks"]
- ka: "SOIM"
topic: "PENETRATION TESTING"
keywords: ["PENETRATION TESTING - SOFTWARE TOOLS"]
---
# Introduction to Linux and security tools
### License {#preparation-and-logging-in}

View File

@@ -1,3 +1,30 @@
---
title: "Malware and an Introduction to Metasploit and Payloads"
author: "Z. Cliffe Schreuders"
description: "Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment."
difficulty: "Beginner"
duration: "120 minutes"
prerequisites: "Basic understanding of operating systems and networking"
tags: ["malware", "metasploit", "payloads", "trojan", "ethical-hacking", "penetration-testing"]
lab_sheet_url: "https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing"
type: ["lab-sheet"]
lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html"
reading: "Chapter 23: Protecting Against Programmed Threats - Practical Unix and Internet Security"
cybok:
- ka: "MAT"
topic: "Malware Taxonomy"
keywords: ["dimensions", "kinds"]
- ka: "MAT"
topic: "Malware Analysis"
keywords: ["anti-analysis and evasion techniques"]
- ka: "MAT"
topic: "Attacks and exploitation"
keywords: ["EXPLOITATION FRAMEWORKS"]
- ka: "SOIM"
topic: "PENETRATION TESTING"
keywords: ["PENETRATION TESTING - SOFTWARE TOOLS", "PENETRATION TESTING - ACTIVE PENETRATION"]
---
# Malware and an Introduction to Metasploit and Payloads
### License {#preparation}