mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-23 04:08:02 +00:00
CyBOK metadata
This commit is contained in:
@@ -26,6 +26,20 @@ A Hackerbot lab. Work through the lab instructions, then when prompted interact
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authentication</topic>
|
||||
<keyword>identity management</keyword>
|
||||
<keyword>user authentication</keyword>
|
||||
<keyword>facets of authentication</keyword>
|
||||
<keyword>Cryptography and authentication (hashes and attacks against authentication schemes / passwords)</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>authentication and identification</keyword>
|
||||
<keyword>Linux authentication</keyword>
|
||||
<keyword>Types of user accounts</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
@@ -24,6 +24,19 @@ A short lab this week, exploring PAM. Work through the labsheet, then when promp
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authentication</topic>
|
||||
<keyword>identity management</keyword>
|
||||
<keyword>user authentication</keyword>
|
||||
<keyword>facets of authentication</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>authentication and identification</keyword>
|
||||
<keyword>Linux authentication</keyword>
|
||||
<keyword>Authentication frameworks (PAM)</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
@@ -24,6 +24,26 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authorisation</topic>
|
||||
<keyword>access control</keyword>
|
||||
<keyword>enforcing access control</keyword>
|
||||
<keyword>ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL)</keyword>
|
||||
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>Access controls and operating systems</keyword>
|
||||
<keyword>Linux security model</keyword>
|
||||
<keyword>Unix File Permissions</keyword>
|
||||
<keyword>filesystems, inodes, and commands</keyword>
|
||||
<keyword>umask</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Role of Operating Systems</topic>
|
||||
<keyword>mediation</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>shared_desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
@@ -24,6 +24,22 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authorisation</topic>
|
||||
<keyword>access control</keyword>
|
||||
<keyword>Elevated privileges</keyword>
|
||||
<keyword>Real and effective identity</keyword>
|
||||
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>Access controls and operating systems</keyword>
|
||||
<keyword>Linux security model</keyword>
|
||||
<keyword>Unix File Permissions</keyword>
|
||||
<keyword>setuid/setgid</keyword>
|
||||
<keyword>Hardlink protections</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>shared_desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
@@ -25,6 +25,19 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authorisation</topic>
|
||||
<keyword>access control</keyword>
|
||||
<keyword>ACCESS CONTROL LIST (ACL)</keyword>
|
||||
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>Access controls and operating systems</keyword>
|
||||
<keyword>Linux security model</keyword>
|
||||
<keyword>Linux Extended Access Control Lists (facl)</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>shared_desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
@@ -24,6 +24,28 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authorisation</topic>
|
||||
<keyword>SANDBOX</keyword>
|
||||
<keyword>Application-based access controls: user-based access controls insufficiently limit privileges</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>capabilities</keyword>
|
||||
<keyword>Container-based sandboxes: chroot, Docker</keyword>
|
||||
<keyword>Rule-based controls: Course grained: Linux capabilities</keyword>
|
||||
<keyword>Vulnerabilities and attacks on sandboxing misconfigurations</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Role of Operating Systems</topic>
|
||||
<keyword>isolation</keyword>
|
||||
<keyword>CONTAINERS</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="WMS">
|
||||
<topic>Fundamental Concepts and Approaches</topic>
|
||||
<keyword>sandboxing</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
@@ -51,7 +73,7 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<input into="super_user">
|
||||
<value>true</value>
|
||||
</input>
|
||||
|
||||
|
||||
<input into="leaked_filenames">
|
||||
<value>mysecret</value>
|
||||
</input>
|
||||
|
||||
@@ -29,6 +29,23 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>intermediate</difficulty>
|
||||
|
||||
<CyBOK KA="AAA">
|
||||
<topic>Authorisation</topic>
|
||||
<keyword>ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL)</keyword>
|
||||
<keyword>ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL)</keyword>
|
||||
<keyword>Application-based access controls: user-based access controls insufficiently limit privileges</keyword>
|
||||
<keyword>Rule-based sandboxes</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="OSVS">
|
||||
<topic>Primitives for Isolation and Mediation</topic>
|
||||
<keyword>Rule-based controls: Fine grained: AppArmor</keyword>
|
||||
<keyword>Vulnerabilities and attacks on sandboxing misconfigurations</keyword>
|
||||
</CyBOK>
|
||||
<CyBOK KA="SS">
|
||||
<topic>Mitigating Exploitation</topic>
|
||||
<keyword>limiting privileges</keyword>
|
||||
</CyBOK>
|
||||
|
||||
<system>
|
||||
<system_name>desktop</system_name>
|
||||
<base distro="Debian 10" type="desktop" name="KDE"/>
|
||||
|
||||
Reference in New Issue
Block a user