CyBOK metadata

This commit is contained in:
Z. Cliffe Schreuders
2021-04-16 13:35:40 +01:00
parent 9a7d2f79a5
commit 2f34de0cbd
7 changed files with 116 additions and 1 deletions

View File

@@ -26,6 +26,20 @@ A Hackerbot lab. Work through the lab instructions, then when prompted interact
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authentication</topic>
<keyword>identity management</keyword>
<keyword>user authentication</keyword>
<keyword>facets of authentication</keyword>
<keyword>Cryptography and authentication (hashes and attacks against authentication schemes / passwords)</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>authentication and identification</keyword>
<keyword>Linux authentication</keyword>
<keyword>Types of user accounts</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>

View File

@@ -24,6 +24,19 @@ A short lab this week, exploring PAM. Work through the labsheet, then when promp
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authentication</topic>
<keyword>identity management</keyword>
<keyword>user authentication</keyword>
<keyword>facets of authentication</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>authentication and identification</keyword>
<keyword>Linux authentication</keyword>
<keyword>Authentication frameworks (PAM)</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>

View File

@@ -24,6 +24,26 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authorisation</topic>
<keyword>access control</keyword>
<keyword>enforcing access control</keyword>
<keyword>ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL)</keyword>
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Unix File Permissions</keyword>
<keyword>filesystems, inodes, and commands</keyword>
<keyword>umask</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Role of Operating Systems</topic>
<keyword>mediation</keyword>
</CyBOK>
<system>
<system_name>shared_desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>

View File

@@ -24,6 +24,22 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authorisation</topic>
<keyword>access control</keyword>
<keyword>Elevated privileges</keyword>
<keyword>Real and effective identity</keyword>
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Unix File Permissions</keyword>
<keyword>setuid/setgid</keyword>
<keyword>Hardlink protections</keyword>
</CyBOK>
<system>
<system_name>shared_desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>

View File

@@ -25,6 +25,19 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authorisation</topic>
<keyword>access control</keyword>
<keyword>ACCESS CONTROL LIST (ACL)</keyword>
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Linux Extended Access Control Lists (facl)</keyword>
</CyBOK>
<system>
<system_name>shared_desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>

View File

@@ -24,6 +24,28 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authorisation</topic>
<keyword>SANDBOX</keyword>
<keyword>Application-based access controls: user-based access controls insufficiently limit privileges</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>capabilities</keyword>
<keyword>Container-based sandboxes: chroot, Docker</keyword>
<keyword>Rule-based controls: Course grained: Linux capabilities</keyword>
<keyword>Vulnerabilities and attacks on sandboxing misconfigurations</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Role of Operating Systems</topic>
<keyword>isolation</keyword>
<keyword>CONTAINERS</keyword>
</CyBOK>
<CyBOK KA="WMS">
<topic>Fundamental Concepts and Approaches</topic>
<keyword>sandboxing</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>
@@ -51,7 +73,7 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<input into="super_user">
<value>true</value>
</input>
<input into="leaked_filenames">
<value>mysecret</value>
</input>

View File

@@ -29,6 +29,23 @@ A Hackerbot lab. Work through the labsheet, then when prompted interact with Hac
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA">
<topic>Authorisation</topic>
<keyword>ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL)</keyword>
<keyword>ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL)</keyword>
<keyword>Application-based access controls: user-based access controls insufficiently limit privileges</keyword>
<keyword>Rule-based sandboxes</keyword>
</CyBOK>
<CyBOK KA="OSVS">
<topic>Primitives for Isolation and Mediation</topic>
<keyword>Rule-based controls: Fine grained: AppArmor</keyword>
<keyword>Vulnerabilities and attacks on sandboxing misconfigurations</keyword>
</CyBOK>
<CyBOK KA="SS">
<topic>Mitigating Exploitation</topic>
<keyword>limiting privileges</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>