diff --git a/scenarios/ctf/access_can_roll.xml b/scenarios/ctf/access_can_roll.xml
index fa122c34c..b1977ef0c 100644
--- a/scenarios/ctf/access_can_roll.xml
+++ b/scenarios/ctf/access_can_roll.xml
@@ -34,7 +34,7 @@ Your password on both systems is: tiaspbiqe2r
setuid/setgid
Hardlink protections
-
+
public-key signatures
diff --git a/scenarios/ctf/analyse_this.xml b/scenarios/ctf/analyse_this.xml
index 6e4ec1c22..231b2ff15 100644
--- a/scenarios/ctf/analyse_this.xml
+++ b/scenarios/ctf/analyse_this.xml
@@ -20,7 +20,7 @@
Encoding and alternative data formats
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/encoding_challenges.xml b/scenarios/ctf/encoding_challenges.xml
index a6a9cf850..78040c156 100644
--- a/scenarios/ctf/encoding_challenges.xml
+++ b/scenarios/ctf/encoding_challenges.xml
@@ -15,10 +15,10 @@
crypto-ctf
easy
-
+
symmetric encryption and authentication
-
+
public-key encryption
diff --git a/scenarios/ctf/feeling_blu.xml b/scenarios/ctf/feeling_blu.xml
index 91f135042..ffe06d80d 100644
--- a/scenarios/ctf/feeling_blu.xml
+++ b/scenarios/ctf/feeling_blu.xml
@@ -59,7 +59,7 @@
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/ff_decode_me.xml b/scenarios/ctf/ff_decode_me.xml
index 14383fe5c..f71c13862 100644
--- a/scenarios/ctf/ff_decode_me.xml
+++ b/scenarios/ctf/ff_decode_me.xml
@@ -15,7 +15,7 @@
pwn-ctf
intermediate
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/ff_hackme_corp.xml b/scenarios/ctf/ff_hackme_corp.xml
index 7da224a23..5a5629b5d 100644
--- a/scenarios/ctf/ff_hackme_corp.xml
+++ b/scenarios/ctf/ff_hackme_corp.xml
@@ -18,7 +18,7 @@ Happy hacking!
pwn-ctf
easy
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/ff_in_the_wild.xml b/scenarios/ctf/ff_in_the_wild.xml
index 80306e5dd..cc16026a4 100644
--- a/scenarios/ctf/ff_in_the_wild.xml
+++ b/scenarios/ctf/ff_in_the_wild.xml
@@ -15,7 +15,7 @@
pwn-ctf
intermediate
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/flawed_fortress.xml b/scenarios/ctf/flawed_fortress.xml
index c11933bb6..b9c7b6ac5 100644
--- a/scenarios/ctf/flawed_fortress.xml
+++ b/scenarios/ctf/flawed_fortress.xml
@@ -17,7 +17,7 @@
pwn-ctf
intermediate
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/nw_cyber_games.xml b/scenarios/ctf/nw_cyber_games.xml
index a169fb888..e0b5ada19 100644
--- a/scenarios/ctf/nw_cyber_games.xml
+++ b/scenarios/ctf/nw_cyber_games.xml
@@ -15,7 +15,7 @@
web-hints
easy
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/performance_peril.xml b/scenarios/ctf/performance_peril.xml
index 76d3aecc9..a761b1c48 100644
--- a/scenarios/ctf/performance_peril.xml
+++ b/scenarios/ctf/performance_peril.xml
@@ -37,7 +37,7 @@
Encoding and alternative data formats
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/post_it.xml b/scenarios/ctf/post_it.xml
index d01935a15..6c0757ec0 100644
--- a/scenarios/ctf/post_it.xml
+++ b/scenarios/ctf/post_it.xml
@@ -39,7 +39,7 @@
Post-exploitation: pivoting attacks, information gathering
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/rooting_for_a_win.xml b/scenarios/ctf/rooting_for_a_win.xml
index 6b9eab529..b269cd04f 100644
--- a/scenarios/ctf/rooting_for_a_win.xml
+++ b/scenarios/ctf/rooting_for_a_win.xml
@@ -35,7 +35,7 @@
Encoding and alternative data formats
-
+
symmetric encryption and authentication
diff --git a/scenarios/ctf/time_to_patch.xml b/scenarios/ctf/time_to_patch.xml
index bc984921e..c003fe678 100644
--- a/scenarios/ctf/time_to_patch.xml
+++ b/scenarios/ctf/time_to_patch.xml
@@ -63,7 +63,7 @@
-
+
symmetric encryption and authentication
diff --git a/scenarios/examples/cybok_example.xml b/scenarios/examples/cybok_example.xml
index 94b25e03d..643f0b4c5 100644
--- a/scenarios/examples/cybok_example.xml
+++ b/scenarios/examples/cybok_example.xml
@@ -21,7 +21,7 @@
ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL)
Unix File Permissions
-
+
stream ciphers
substitution ciphers
diff --git a/scenarios/labs/cyber_security_landscape/3_phishing.xml b/scenarios/labs/cyber_security_landscape/3_phishing.xml
index e09a8222d..fe1ee9fc6 100644
--- a/scenarios/labs/cyber_security_landscape/3_phishing.xml
+++ b/scenarios/labs/cyber_security_landscape/3_phishing.xml
@@ -29,7 +29,12 @@
MALCODE/MALWARE - SOCIAL ENGINEERING - BAITING
MALCODE/MALWARE - SOCIAL ENGINEERING - PRETEXTING
MALCODE/MALWARE - VIRUSES - COUNTERMEASUMALCODE/MALWARE - VIRUSES - MACRO VIRUSES
- MALCODE/MALWARE - SPAM . . . . .MALCODE/MALWARE - SPOOFING
+ MALCODE/MALWARE - SPAM
+ MALCODE/MALWARE - SPOOFING
+
+
+ E-MAIL - PHISHING
+ E-MAIL - SPOOFING
diff --git a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
index b9174c640..af3483a5a 100644
--- a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
+++ b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
@@ -31,6 +31,10 @@
Encoding and alternative data formats
+
+ ENCODING
+ BASE64
+
desktop
diff --git a/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml b/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml
index ed9a2d725..b164a0ce5 100644
--- a/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml
+++ b/scenarios/labs/cyber_security_landscape/6_symmetric_enc_aes.xml
@@ -19,6 +19,20 @@
lab-sheet
intermediate
+
+ ADVANCED ENCRYPTION STANDARD (AES)
+ ECB (ELECTRONIC CODE BOOK) BLOCK CIPHER MODE
+
+
+ symmetric primitives
+ symmetric encryption and authentication
+
+
+ Cryptographic Libraries
+ ENCRYPTION - TOOLS
+
+
+
desktop
diff --git a/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml b/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml
index 953c509ce..1b3b9892a 100644
--- a/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml
+++ b/scenarios/labs/cyber_security_landscape/7_asymmetric_enc_rsa.xml
@@ -19,6 +19,25 @@
lab-sheet
intermediate
+
+ CRYPTOGRAPHY - ASYMMETRIC - RSA
+ DIFFIE-HELLMAN ALGORITHM
+
+
+ public-key encryption
+ public-key signatures
+ RSA MODULUS
+ RSA PROBLEM
+ RSA TRANSFORM
+
+
+ key generation
+
+
+ Cryptographic Libraries
+ ENCRYPTION - TOOLS
+
+
desktop
diff --git a/scenarios/labs/labtainers/cyberciege.xml b/scenarios/labs/labtainers/cyberciege.xml
index f837f9cfa..3a9fde06d 100644
--- a/scenarios/labs/labtainers/cyberciege.xml
+++ b/scenarios/labs/labtainers/cyberciege.xml
@@ -19,7 +19,7 @@
ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL)
-
+
TLS
diff --git a/scenarios/labs/labtainers/macs-hash.xml b/scenarios/labs/labtainers/macs-hash.xml
index fe10c1aa0..abbb27c73 100644
--- a/scenarios/labs/labtainers/macs-hash.xml
+++ b/scenarios/labs/labtainers/macs-hash.xml
@@ -16,7 +16,7 @@
user authentication
Cryptography and authentication (hashes and attacks against authentication schemes / passwords)
-
+
symmetric encryption and authentication
MESSAGE AUTHENTICATION CODE (MAC)
HASHED MESSAGE AUTHENTICATION CODE (HMAC)
diff --git a/scenarios/labs/labtainers/onewayhash.xml b/scenarios/labs/labtainers/onewayhash.xml
index 19a85f98b..7b88649de 100644
--- a/scenarios/labs/labtainers/onewayhash.xml
+++ b/scenarios/labs/labtainers/onewayhash.xml
@@ -16,7 +16,7 @@
user authentication
Cryptography and authentication (hashes and attacks against authentication schemes / passwords)
-
+
symmetric encryption and authentication
MESSAGE AUTHENTICATION CODE (MAC)
diff --git a/scenarios/labs/labtainers/pubkey.xml b/scenarios/labs/labtainers/pubkey.xml
index 82a781d43..858058888 100644
--- a/scenarios/labs/labtainers/pubkey.xml
+++ b/scenarios/labs/labtainers/pubkey.xml
@@ -12,7 +12,7 @@
lab-sheet
intermediate
-
+
TLS
diff --git a/scenarios/labs/labtainers/ssh-agent.xml b/scenarios/labs/labtainers/ssh-agent.xml
index 5664b750f..9a066315e 100644
--- a/scenarios/labs/labtainers/ssh-agent.xml
+++ b/scenarios/labs/labtainers/ssh-agent.xml
@@ -12,7 +12,7 @@
lab-sheet
intermediate
-
+
public-key encryption
public-key signatures
diff --git a/scenarios/labs/labtainers/sshlab.xml b/scenarios/labs/labtainers/sshlab.xml
index e68f0bb40..388308692 100644
--- a/scenarios/labs/labtainers/sshlab.xml
+++ b/scenarios/labs/labtainers/sshlab.xml
@@ -12,7 +12,7 @@
lab-sheet
intermediate
-
+
public-key encryption
public-key signatures
diff --git a/scenarios/labs/labtainers/ssl.xml b/scenarios/labs/labtainers/ssl.xml
index 2ca6c720d..e948bdd06 100644
--- a/scenarios/labs/labtainers/ssl.xml
+++ b/scenarios/labs/labtainers/ssl.xml
@@ -12,7 +12,7 @@
lab-sheet
intermediate
-
+
public-key encryption
public-key signatures
diff --git a/scenarios/labs/labtainers/symkeylab.xml b/scenarios/labs/labtainers/symkeylab.xml
index fcd5d8fc9..c642c19b8 100644
--- a/scenarios/labs/labtainers/symkeylab.xml
+++ b/scenarios/labs/labtainers/symkeylab.xml
@@ -12,11 +12,11 @@
lab-sheet
intermediate
-
+
AES
-
+
symmetric primitives
symmetric encryption and authentication
diff --git a/scenarios/labs/web_security/1_intro_web_security.xml b/scenarios/labs/web_security/1_intro_web_security.xml
index 121360265..23e263c5c 100644
--- a/scenarios/labs/web_security/1_intro_web_security.xml
+++ b/scenarios/labs/web_security/1_intro_web_security.xml
@@ -18,6 +18,25 @@ Throughout this lab, you will learn by doing, actively engaging in activities. A
lab-sheet
intermediate
+
+ JAVASCRIPT
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ CASCADING STYLE SHEETS (CSS)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ Broken Access Control / Insecure Direct Object References
+ CLIENT-SERVER MODELS
+
+
+ server-side misconfiguration and vulnerable components
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/2_sessions_and_cookies.xml b/scenarios/labs/web_security/2_sessions_and_cookies.xml
index 47155419a..6079ec21a 100644
--- a/scenarios/labs/web_security/2_sessions_and_cookies.xml
+++ b/scenarios/labs/web_security/2_sessions_and_cookies.xml
@@ -16,6 +16,28 @@ Throughout the lab, you will learn to self-host PHP pages, use OWASP Zap to anal
lab-environment
ctf-lab
+
+ cookies
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ Broken Access Control / Insecure Direct Object References
+ SESSION HIJACKING
+ CLIENT-SERVER MODELS
+
+
+ client-side storage
+
+
+ server-side misconfiguration and vulnerable components
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/3_xss.xml b/scenarios/labs/web_security/3_xss.xml
index b8bce4754..b5e7b81db 100644
--- a/scenarios/labs/web_security/3_xss.xml
+++ b/scenarios/labs/web_security/3_xss.xml
@@ -17,6 +17,35 @@ Throughout this lab, you will engage with various learning resources, including
lab-environment
ctf-lab
+
+ cookies
+ JAVASCRIPT
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ SESSION HIJACKING
+ CLIENT-SERVER MODELS
+
+
+ client-side storage
+ CLIENT-SIDE VALIDATION
+
+
+ injection vulnerabilities
+ server-side misconfiguration and vulnerable components
+ CROSS-SITE SCRIPTING (XSS)
+ BACK-END
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ coding practices
+ Protecting against session management attacks, XSS, SQLi, CSRF
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/4_sqli.xml b/scenarios/labs/web_security/4_sqli.xml
index a05c315ba..f641c0d5f 100644
--- a/scenarios/labs/web_security/4_sqli.xml
+++ b/scenarios/labs/web_security/4_sqli.xml
@@ -17,6 +17,31 @@ Throughout this lab, you will engage in a series of tasks across various platfor
lab-environment
ctf-lab
+
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ DATABASE
+ SESSION HIJACKING
+ CLIENT-SERVER MODELS
+
+
+ injection vulnerabilities
+ server-side misconfiguration and vulnerable components
+ SQL-INJECTION
+ BACK-END
+ BLIND ATTACKS
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ coding practices
+ Protecting against session management attacks, XSS, SQLi, CSRF
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/5_sqli_advanced.xml b/scenarios/labs/web_security/5_sqli_advanced.xml
index 23d52d97a..989b2bba9 100644
--- a/scenarios/labs/web_security/5_sqli_advanced.xml
+++ b/scenarios/labs/web_security/5_sqli_advanced.xml
@@ -17,6 +17,32 @@ Throughout the lab, you will engage with various vulnerable environments, includ
lab-environment
ctf-lab
+
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ DATABASE
+ SESSION HIJACKING
+ CLIENT-SERVER MODELS
+
+
+ injection vulnerabilities
+ server-side misconfiguration and vulnerable components
+ COMMAND INJECTION
+ SQL-INJECTION
+ BACK-END
+ BLIND ATTACKS
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ coding practices
+ Protecting against session management attacks, XSS, SQLi, CSRF
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/6_csrf.xml b/scenarios/labs/web_security/6_csrf.xml
index 5887f33d7..a3dd994bc 100644
--- a/scenarios/labs/web_security/6_csrf.xml
+++ b/scenarios/labs/web_security/6_csrf.xml
@@ -17,6 +17,39 @@ Throughout the lab, you will engage in hands-on tasks that mirror real-world sce
lab-environment
ctf-lab
+
+ cookies
+ JAVASCRIPT
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ DATABASE
+ SESSION HIJACKING
+ CLIENT-SERVER MODELS
+
+
+ client-side storage
+ CLIENT-SIDE VALIDATION
+ clickjacking
+
+
+ injection vulnerabilities
+ server-side misconfiguration and vulnerable components
+ CROSS-SITE SCRIPTING (XSS)
+ CROSS-SITE REQUEST FORGERY (CSRF)
+ CONFUSED DEPUTY ATTACKS
+ BACK-END
+
+
+ Web vulnerabilities / OWASP Top 10
+
+
+ coding practices
+ Protecting against session management attacks, XSS, SQLi, CSRF
+
+
+ dynamic detection
+
+
web_server
diff --git a/scenarios/labs/web_security/7_additional_web.xml b/scenarios/labs/web_security/7_additional_web.xml
index 2bc67c968..848fe81c6 100644
--- a/scenarios/labs/web_security/7_additional_web.xml
+++ b/scenarios/labs/web_security/7_additional_web.xml
@@ -15,6 +15,75 @@ Web and Network Security additional CTF challenges.
lab-environment
ctf-lab
+
+
+ web PKI and HTTPS
+ authentication
+ ACCESS CONTROL
+ cookies
+ passwords and alternatives
+ JAVASCRIPT
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ CASCADING STYLE SHEETS (CSS)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ DATABASE
+ Broken Access Control / Insecure Direct Object References
+ SESSION HIJACKING
+ CERTIFICATES
+ REPRESENTATIONAL STATE TRANSFER (REST)
+ PERMISSION DIALOG BASED ACCESS CONTROL
+ CLIENT-SERVER MODELS
+
+
+ client-side storage
+ CLIENT-SIDE VALIDATION
+ clickjacking
+
+
+ injection vulnerabilities
+ server-side misconfiguration and vulnerable components
+ CROSS-SITE SCRIPTING (XSS)
+ SAME ORIGIN POLICY (SOP)
+ COMMAND INJECTION
+ SQL-INJECTION
+ CROSS-SITE REQUEST FORGERY (CSRF)
+ CONFUSED DEPUTY ATTACKS
+ BACK-END
+ BLIND ATTACKS
+
+
+ Web vulnerabilities / OWASP Top 10
+ API vulnerabilities
+
+
+ coding practices
+ Protecting against session management attacks, XSS, SQLi, CSRF
+ API design
+
+
+ dynamic detection
+
+
+
+ network traffic
+
+
+ network connections
+ data recovery and file content carving
+
+
+ FIREWALLS
+ IPTables
+ VIRTUAL - PRIVATE NETWORK (VPN)
+
+
+ network layer security
+
+
+ FIREWALLS
+
+
web_server
diff --git a/scenarios/labs/web_security/websec_lab.xml b/scenarios/labs/web_security/websec_lab.xml
index a133405fc..30f3e563a 100644
--- a/scenarios/labs/web_security/websec_lab.xml
+++ b/scenarios/labs/web_security/websec_lab.xml
@@ -15,14 +15,21 @@
web PKI and HTTPS
authentication
+ ACCESS CONTROL
cookies
passwords and alternatives
- JAVASCRIPT / HYPERTEXT MARKUP LANGUAGE (HTML) / CASCADING STYLE SHEETS (CSS) / HYPERTEXT TRANSFER PROTOCOL (HTTP)
- COOKIES
+ JAVASCRIPT
+ HYPERTEXT MARKUP LANGUAGE (HTML)
+ CASCADING STYLE SHEETS (CSS)
+ HYPERTEXT TRANSFER PROTOCOL (HTTP)
HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING
+ DATABASE
Broken Access Control / Insecure Direct Object References
SESSION HIJACKING
+ CERTIFICATES
REPRESENTATIONAL STATE TRANSFER (REST)
+ PERMISSION DIALOG BASED ACCESS CONTROL
+ CLIENT-SERVER MODELS
client-side storage
@@ -38,6 +45,8 @@
SQL-INJECTION
CROSS-SITE REQUEST FORGERY (CSRF)
CONFUSED DEPUTY ATTACKS
+ BACK-END
+ BLIND ATTACKS
Web vulnerabilities / OWASP Top 10
@@ -48,6 +57,28 @@
Protecting against session management attacks, XSS, SQLi, CSRF
API design
+
+ dynamic detection
+
+
+
+ network traffic
+
+
+ network connections
+ data recovery and file content carving
+
+
+ FIREWALLS
+ IPTables
+ VIRTUAL - PRIVATE NETWORK (VPN)
+
+
+ network layer security
+
+
+ FIREWALLS
+
kali