diff --git a/scenarios/ctf/access_can_roll.xml b/scenarios/ctf/access_can_roll.xml index fa122c34c..b1977ef0c 100644 --- a/scenarios/ctf/access_can_roll.xml +++ b/scenarios/ctf/access_can_roll.xml @@ -34,7 +34,7 @@ Your password on both systems is: tiaspbiqe2r setuid/setgid Hardlink protections - + public-key signatures diff --git a/scenarios/ctf/analyse_this.xml b/scenarios/ctf/analyse_this.xml index 6e4ec1c22..231b2ff15 100644 --- a/scenarios/ctf/analyse_this.xml +++ b/scenarios/ctf/analyse_this.xml @@ -20,7 +20,7 @@ Encoding and alternative data formats - + symmetric encryption and authentication diff --git a/scenarios/ctf/encoding_challenges.xml b/scenarios/ctf/encoding_challenges.xml index a6a9cf850..78040c156 100644 --- a/scenarios/ctf/encoding_challenges.xml +++ b/scenarios/ctf/encoding_challenges.xml @@ -15,10 +15,10 @@ crypto-ctf easy - + symmetric encryption and authentication - + public-key encryption diff --git a/scenarios/ctf/feeling_blu.xml b/scenarios/ctf/feeling_blu.xml index 91f135042..ffe06d80d 100644 --- a/scenarios/ctf/feeling_blu.xml +++ b/scenarios/ctf/feeling_blu.xml @@ -59,7 +59,7 @@ - + symmetric encryption and authentication diff --git a/scenarios/ctf/ff_decode_me.xml b/scenarios/ctf/ff_decode_me.xml index 14383fe5c..f71c13862 100644 --- a/scenarios/ctf/ff_decode_me.xml +++ b/scenarios/ctf/ff_decode_me.xml @@ -15,7 +15,7 @@ pwn-ctf intermediate - + symmetric encryption and authentication diff --git a/scenarios/ctf/ff_hackme_corp.xml b/scenarios/ctf/ff_hackme_corp.xml index 7da224a23..5a5629b5d 100644 --- a/scenarios/ctf/ff_hackme_corp.xml +++ b/scenarios/ctf/ff_hackme_corp.xml @@ -18,7 +18,7 @@ Happy hacking! pwn-ctf easy - + symmetric encryption and authentication diff --git a/scenarios/ctf/ff_in_the_wild.xml b/scenarios/ctf/ff_in_the_wild.xml index 80306e5dd..cc16026a4 100644 --- a/scenarios/ctf/ff_in_the_wild.xml +++ b/scenarios/ctf/ff_in_the_wild.xml @@ -15,7 +15,7 @@ pwn-ctf intermediate - + symmetric encryption and authentication diff --git a/scenarios/ctf/flawed_fortress.xml b/scenarios/ctf/flawed_fortress.xml index c11933bb6..b9c7b6ac5 100644 --- a/scenarios/ctf/flawed_fortress.xml +++ b/scenarios/ctf/flawed_fortress.xml @@ -17,7 +17,7 @@ pwn-ctf intermediate - + symmetric encryption and authentication diff --git a/scenarios/ctf/nw_cyber_games.xml b/scenarios/ctf/nw_cyber_games.xml index a169fb888..e0b5ada19 100644 --- a/scenarios/ctf/nw_cyber_games.xml +++ b/scenarios/ctf/nw_cyber_games.xml @@ -15,7 +15,7 @@ web-hints easy - + symmetric encryption and authentication diff --git a/scenarios/ctf/performance_peril.xml b/scenarios/ctf/performance_peril.xml index 76d3aecc9..a761b1c48 100644 --- a/scenarios/ctf/performance_peril.xml +++ b/scenarios/ctf/performance_peril.xml @@ -37,7 +37,7 @@ Encoding and alternative data formats - + symmetric encryption and authentication diff --git a/scenarios/ctf/post_it.xml b/scenarios/ctf/post_it.xml index d01935a15..6c0757ec0 100644 --- a/scenarios/ctf/post_it.xml +++ b/scenarios/ctf/post_it.xml @@ -39,7 +39,7 @@ Post-exploitation: pivoting attacks, information gathering - + symmetric encryption and authentication diff --git a/scenarios/ctf/rooting_for_a_win.xml b/scenarios/ctf/rooting_for_a_win.xml index 6b9eab529..b269cd04f 100644 --- a/scenarios/ctf/rooting_for_a_win.xml +++ b/scenarios/ctf/rooting_for_a_win.xml @@ -35,7 +35,7 @@ Encoding and alternative data formats - + symmetric encryption and authentication diff --git a/scenarios/ctf/time_to_patch.xml b/scenarios/ctf/time_to_patch.xml index bc984921e..c003fe678 100644 --- a/scenarios/ctf/time_to_patch.xml +++ b/scenarios/ctf/time_to_patch.xml @@ -63,7 +63,7 @@ - + symmetric encryption and authentication diff --git a/scenarios/examples/cybok_example.xml b/scenarios/examples/cybok_example.xml index 94b25e03d..643f0b4c5 100644 --- a/scenarios/examples/cybok_example.xml +++ b/scenarios/examples/cybok_example.xml @@ -21,7 +21,7 @@ ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL) Unix File Permissions - + stream ciphers substitution ciphers diff --git a/scenarios/labs/cyber_security_landscape/3_phishing.xml b/scenarios/labs/cyber_security_landscape/3_phishing.xml index e09a8222d..fe1ee9fc6 100644 --- a/scenarios/labs/cyber_security_landscape/3_phishing.xml +++ b/scenarios/labs/cyber_security_landscape/3_phishing.xml @@ -29,7 +29,12 @@ MALCODE/MALWARE - SOCIAL ENGINEERING - BAITING MALCODE/MALWARE - SOCIAL ENGINEERING - PRETEXTING MALCODE/MALWARE - VIRUSES - COUNTERMEASUMALCODE/MALWARE - VIRUSES - MACRO VIRUSES - MALCODE/MALWARE - SPAM . . . . .MALCODE/MALWARE - SPOOFING + MALCODE/MALWARE - SPAM + MALCODE/MALWARE - SPOOFING + + + E-MAIL - PHISHING + E-MAIL - SPOOFING diff --git a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml index b9174c640..af3483a5a 100644 --- a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml +++ b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml @@ -31,6 +31,10 @@ Encoding and alternative data formats + + ENCODING + BASE64 + desktop diff --git a/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml b/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml index ed9a2d725..b164a0ce5 100644 --- a/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml +++ b/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml @@ -19,6 +19,20 @@ lab-sheet intermediate + + ADVANCED ENCRYPTION STANDARD (AES) + ECB (ELECTRONIC CODE BOOK) BLOCK CIPHER MODE + + + symmetric primitives + symmetric encryption and authentication + + + Cryptographic Libraries + ENCRYPTION - TOOLS + + + desktop diff --git a/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml b/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml index 953c509ce..1b3b9892a 100644 --- a/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml +++ b/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml @@ -19,6 +19,25 @@ lab-sheet intermediate + + CRYPTOGRAPHY - ASYMMETRIC - RSA + DIFFIE-HELLMAN ALGORITHM + + + public-key encryption + public-key signatures + RSA MODULUS + RSA PROBLEM + RSA TRANSFORM + + + key generation + + + Cryptographic Libraries + ENCRYPTION - TOOLS + + desktop diff --git a/scenarios/labs/labtainers/cyberciege.xml b/scenarios/labs/labtainers/cyberciege.xml index f837f9cfa..3a9fde06d 100644 --- a/scenarios/labs/labtainers/cyberciege.xml +++ b/scenarios/labs/labtainers/cyberciege.xml @@ -19,7 +19,7 @@ ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL) - + TLS diff --git a/scenarios/labs/labtainers/macs-hash.xml b/scenarios/labs/labtainers/macs-hash.xml index fe10c1aa0..abbb27c73 100644 --- a/scenarios/labs/labtainers/macs-hash.xml +++ b/scenarios/labs/labtainers/macs-hash.xml @@ -16,7 +16,7 @@ user authentication Cryptography and authentication (hashes and attacks against authentication schemes / passwords) - + symmetric encryption and authentication MESSAGE AUTHENTICATION CODE (MAC) HASHED MESSAGE AUTHENTICATION CODE (HMAC) diff --git a/scenarios/labs/labtainers/onewayhash.xml b/scenarios/labs/labtainers/onewayhash.xml index 19a85f98b..7b88649de 100644 --- a/scenarios/labs/labtainers/onewayhash.xml +++ b/scenarios/labs/labtainers/onewayhash.xml @@ -16,7 +16,7 @@ user authentication Cryptography and authentication (hashes and attacks against authentication schemes / passwords) - + symmetric encryption and authentication MESSAGE AUTHENTICATION CODE (MAC) diff --git a/scenarios/labs/labtainers/pubkey.xml b/scenarios/labs/labtainers/pubkey.xml index 82a781d43..858058888 100644 --- a/scenarios/labs/labtainers/pubkey.xml +++ b/scenarios/labs/labtainers/pubkey.xml @@ -12,7 +12,7 @@ lab-sheet intermediate - + TLS diff --git a/scenarios/labs/labtainers/ssh-agent.xml b/scenarios/labs/labtainers/ssh-agent.xml index 5664b750f..9a066315e 100644 --- a/scenarios/labs/labtainers/ssh-agent.xml +++ b/scenarios/labs/labtainers/ssh-agent.xml @@ -12,7 +12,7 @@ lab-sheet intermediate - + public-key encryption public-key signatures diff --git a/scenarios/labs/labtainers/sshlab.xml b/scenarios/labs/labtainers/sshlab.xml index e68f0bb40..388308692 100644 --- a/scenarios/labs/labtainers/sshlab.xml +++ b/scenarios/labs/labtainers/sshlab.xml @@ -12,7 +12,7 @@ lab-sheet intermediate - + public-key encryption public-key signatures diff --git a/scenarios/labs/labtainers/ssl.xml b/scenarios/labs/labtainers/ssl.xml index 2ca6c720d..e948bdd06 100644 --- a/scenarios/labs/labtainers/ssl.xml +++ b/scenarios/labs/labtainers/ssl.xml @@ -12,7 +12,7 @@ lab-sheet intermediate - + public-key encryption public-key signatures diff --git a/scenarios/labs/labtainers/symkeylab.xml b/scenarios/labs/labtainers/symkeylab.xml index fcd5d8fc9..c642c19b8 100644 --- a/scenarios/labs/labtainers/symkeylab.xml +++ b/scenarios/labs/labtainers/symkeylab.xml @@ -12,11 +12,11 @@ lab-sheet intermediate - + AES - + symmetric primitives symmetric encryption and authentication diff --git a/scenarios/labs/web_security/1_intro_web_security.xml b/scenarios/labs/web_security/1_intro_web_security.xml index 121360265..23e263c5c 100644 --- a/scenarios/labs/web_security/1_intro_web_security.xml +++ b/scenarios/labs/web_security/1_intro_web_security.xml @@ -18,6 +18,25 @@ Throughout this lab, you will learn by doing, actively engaging in activities. A lab-sheet intermediate + + JAVASCRIPT + HYPERTEXT MARKUP LANGUAGE (HTML) + CASCADING STYLE SHEETS (CSS) + HYPERTEXT TRANSFER PROTOCOL (HTTP) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + Broken Access Control / Insecure Direct Object References + CLIENT-SERVER MODELS + + + server-side misconfiguration and vulnerable components + + + Web vulnerabilities / OWASP Top 10 + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/2_sessions_and_cookies.xml b/scenarios/labs/web_security/2_sessions_and_cookies.xml index 47155419a..6079ec21a 100644 --- a/scenarios/labs/web_security/2_sessions_and_cookies.xml +++ b/scenarios/labs/web_security/2_sessions_and_cookies.xml @@ -16,6 +16,28 @@ Throughout the lab, you will learn to self-host PHP pages, use OWASP Zap to anal lab-environment ctf-lab + + cookies + HYPERTEXT MARKUP LANGUAGE (HTML) + HYPERTEXT TRANSFER PROTOCOL (HTTP) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + Broken Access Control / Insecure Direct Object References + SESSION HIJACKING + CLIENT-SERVER MODELS + + + client-side storage + + + server-side misconfiguration and vulnerable components + + + Web vulnerabilities / OWASP Top 10 + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/3_xss.xml b/scenarios/labs/web_security/3_xss.xml index b8bce4754..b5e7b81db 100644 --- a/scenarios/labs/web_security/3_xss.xml +++ b/scenarios/labs/web_security/3_xss.xml @@ -17,6 +17,35 @@ Throughout this lab, you will engage with various learning resources, including lab-environment ctf-lab + + cookies + JAVASCRIPT + HYPERTEXT MARKUP LANGUAGE (HTML) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + SESSION HIJACKING + CLIENT-SERVER MODELS + + + client-side storage + CLIENT-SIDE VALIDATION + + + injection vulnerabilities + server-side misconfiguration and vulnerable components + CROSS-SITE SCRIPTING (XSS) + BACK-END + + + Web vulnerabilities / OWASP Top 10 + + + coding practices + Protecting against session management attacks, XSS, SQLi, CSRF + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/4_sqli.xml b/scenarios/labs/web_security/4_sqli.xml index a05c315ba..f641c0d5f 100644 --- a/scenarios/labs/web_security/4_sqli.xml +++ b/scenarios/labs/web_security/4_sqli.xml @@ -17,6 +17,31 @@ Throughout this lab, you will engage in a series of tasks across various platfor lab-environment ctf-lab + + HYPERTEXT MARKUP LANGUAGE (HTML) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + DATABASE + SESSION HIJACKING + CLIENT-SERVER MODELS + + + injection vulnerabilities + server-side misconfiguration and vulnerable components + SQL-INJECTION + BACK-END + BLIND ATTACKS + + + Web vulnerabilities / OWASP Top 10 + + + coding practices + Protecting against session management attacks, XSS, SQLi, CSRF + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/5_sqli_advanced.xml b/scenarios/labs/web_security/5_sqli_advanced.xml index 23d52d97a..989b2bba9 100644 --- a/scenarios/labs/web_security/5_sqli_advanced.xml +++ b/scenarios/labs/web_security/5_sqli_advanced.xml @@ -17,6 +17,32 @@ Throughout the lab, you will engage with various vulnerable environments, includ lab-environment ctf-lab + + HYPERTEXT MARKUP LANGUAGE (HTML) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + DATABASE + SESSION HIJACKING + CLIENT-SERVER MODELS + + + injection vulnerabilities + server-side misconfiguration and vulnerable components + COMMAND INJECTION + SQL-INJECTION + BACK-END + BLIND ATTACKS + + + Web vulnerabilities / OWASP Top 10 + + + coding practices + Protecting against session management attacks, XSS, SQLi, CSRF + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/6_csrf.xml b/scenarios/labs/web_security/6_csrf.xml index 5887f33d7..a3dd994bc 100644 --- a/scenarios/labs/web_security/6_csrf.xml +++ b/scenarios/labs/web_security/6_csrf.xml @@ -17,6 +17,39 @@ Throughout the lab, you will engage in hands-on tasks that mirror real-world sce lab-environment ctf-lab + + cookies + JAVASCRIPT + HYPERTEXT MARKUP LANGUAGE (HTML) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + DATABASE + SESSION HIJACKING + CLIENT-SERVER MODELS + + + client-side storage + CLIENT-SIDE VALIDATION + clickjacking + + + injection vulnerabilities + server-side misconfiguration and vulnerable components + CROSS-SITE SCRIPTING (XSS) + CROSS-SITE REQUEST FORGERY (CSRF) + CONFUSED DEPUTY ATTACKS + BACK-END + + + Web vulnerabilities / OWASP Top 10 + + + coding practices + Protecting against session management attacks, XSS, SQLi, CSRF + + + dynamic detection + + web_server diff --git a/scenarios/labs/web_security/7_additional_web.xml b/scenarios/labs/web_security/7_additional_web.xml index 2bc67c968..848fe81c6 100644 --- a/scenarios/labs/web_security/7_additional_web.xml +++ b/scenarios/labs/web_security/7_additional_web.xml @@ -15,6 +15,75 @@ Web and Network Security additional CTF challenges. lab-environment ctf-lab + + + web PKI and HTTPS + authentication + ACCESS CONTROL + cookies + passwords and alternatives + JAVASCRIPT + HYPERTEXT MARKUP LANGUAGE (HTML) + CASCADING STYLE SHEETS (CSS) + HYPERTEXT TRANSFER PROTOCOL (HTTP) + HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + DATABASE + Broken Access Control / Insecure Direct Object References + SESSION HIJACKING + CERTIFICATES + REPRESENTATIONAL STATE TRANSFER (REST) + PERMISSION DIALOG BASED ACCESS CONTROL + CLIENT-SERVER MODELS + + + client-side storage + CLIENT-SIDE VALIDATION + clickjacking + + + injection vulnerabilities + server-side misconfiguration and vulnerable components + CROSS-SITE SCRIPTING (XSS) + SAME ORIGIN POLICY (SOP) + COMMAND INJECTION + SQL-INJECTION + CROSS-SITE REQUEST FORGERY (CSRF) + CONFUSED DEPUTY ATTACKS + BACK-END + BLIND ATTACKS + + + Web vulnerabilities / OWASP Top 10 + API vulnerabilities + + + coding practices + Protecting against session management attacks, XSS, SQLi, CSRF + API design + + + dynamic detection + + + + network traffic + + + network connections + data recovery and file content carving + + + FIREWALLS + IPTables + VIRTUAL - PRIVATE NETWORK (VPN) + + + network layer security + + + FIREWALLS + + web_server diff --git a/scenarios/labs/web_security/websec_lab.xml b/scenarios/labs/web_security/websec_lab.xml index a133405fc..30f3e563a 100644 --- a/scenarios/labs/web_security/websec_lab.xml +++ b/scenarios/labs/web_security/websec_lab.xml @@ -15,14 +15,21 @@ web PKI and HTTPS authentication + ACCESS CONTROL cookies passwords and alternatives - JAVASCRIPT / HYPERTEXT MARKUP LANGUAGE (HTML) / CASCADING STYLE SHEETS (CSS) / HYPERTEXT TRANSFER PROTOCOL (HTTP) - COOKIES + JAVASCRIPT + HYPERTEXT MARKUP LANGUAGE (HTML) + CASCADING STYLE SHEETS (CSS) + HYPERTEXT TRANSFER PROTOCOL (HTTP) HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING + DATABASE Broken Access Control / Insecure Direct Object References SESSION HIJACKING + CERTIFICATES REPRESENTATIONAL STATE TRANSFER (REST) + PERMISSION DIALOG BASED ACCESS CONTROL + CLIENT-SERVER MODELS client-side storage @@ -38,6 +45,8 @@ SQL-INJECTION CROSS-SITE REQUEST FORGERY (CSRF) CONFUSED DEPUTY ATTACKS + BACK-END + BLIND ATTACKS Web vulnerabilities / OWASP Top 10 @@ -48,6 +57,28 @@ Protecting against session management attacks, XSS, SQLi, CSRF API design + + dynamic detection + + + + network traffic + + + network connections + data recovery and file content carving + + + FIREWALLS + IPTables + VIRTUAL - PRIVATE NETWORK (VPN) + + + network layer security + + + FIREWALLS + kali