diff --git a/_labs/introducing_attacks/1_intro_linux.md b/_labs/introducing_attacks/1_intro_linux.md index c1c1b57..f9ca032 100644 --- a/_labs/introducing_attacks/1_intro_linux.md +++ b/_labs/introducing_attacks/1_intro_linux.md @@ -1,3 +1,24 @@ +--- +title: "Introduction to Linux and Security" +author: "Z. Cliffe Schreuders" +description: "Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux." +difficulty: "Beginner" +duration: "90 minutes" +prerequisites: "Basic computer skills" +tags: ["linux", "command-line", "ssh", "kali", "networking", "security"] +lab_sheet_url: "https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing" +type: ["ctf-lab", "lab-sheet"] +lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_1_Intro_to_Unix_FOSS_and_Linux.html" +reading: "Chapters 1-2: Practical Unix and Internet Security by Garfinkel, Spafford, and Schwartz" +cybok: + - ka: "NS" + topic: "Network Protocols and Vulnerability" + keywords: ["common network attacks"] + - ka: "SOIM" + topic: "PENETRATION TESTING" + keywords: ["PENETRATION TESTING - SOFTWARE TOOLS"] +--- + # Introduction to Linux and security tools ### License {#preparation-and-logging-in} diff --git a/_labs/introducing_attacks/2_malware.md b/_labs/introducing_attacks/2_malware_msf_payloads.md similarity index 98% rename from _labs/introducing_attacks/2_malware.md rename to _labs/introducing_attacks/2_malware_msf_payloads.md index 278ec3a..6af46e4 100644 --- a/_labs/introducing_attacks/2_malware.md +++ b/_labs/introducing_attacks/2_malware_msf_payloads.md @@ -1,3 +1,30 @@ +--- +title: "Malware and an Introduction to Metasploit and Payloads" +author: "Z. Cliffe Schreuders" +description: "Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment." +difficulty: "Beginner" +duration: "120 minutes" +prerequisites: "Basic understanding of operating systems and networking" +tags: ["malware", "metasploit", "payloads", "trojan", "ethical-hacking", "penetration-testing"] +lab_sheet_url: "https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing" +type: ["lab-sheet"] +lecture_url: "http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html" +reading: "Chapter 23: Protecting Against Programmed Threats - Practical Unix and Internet Security" +cybok: + - ka: "MAT" + topic: "Malware Taxonomy" + keywords: ["dimensions", "kinds"] + - ka: "MAT" + topic: "Malware Analysis" + keywords: ["anti-analysis and evasion techniques"] + - ka: "MAT" + topic: "Attacks and exploitation" + keywords: ["EXPLOITATION FRAMEWORKS"] + - ka: "SOIM" + topic: "PENETRATION TESTING" + keywords: ["PENETRATION TESTING - SOFTWARE TOOLS", "PENETRATION TESTING - ACTIVE PENETRATION"] +--- + # Malware and an Introduction to Metasploit and Payloads ### License {#preparation}