diff --git a/scenarios/labs/cyber_security_landscape/3_phishing.xml b/scenarios/labs/cyber_security_landscape/3_phishing.xml index 7ae626b56..41ff30041 100644 --- a/scenarios/labs/cyber_security_landscape/3_phishing.xml +++ b/scenarios/labs/cyber_security_landscape/3_phishing.xml @@ -12,7 +12,7 @@ In this lab, you will embark on a simulated cybersecurity mission within a fictitious organization. Your objective is to browse the organization's website to gather information on employees, email addresses, and their potential interests. You will then employ the tactics of engagement by sending targeted phishing emails to these individuals, using techniques such as spoofing emails, creating malicious attachments (executable programs, LibreOffice documents with macros), and more. As your victims respond to your emails, they will reveal why they trust or distrust your messages, providing invaluable feedback. The ultimate goal is to persuade these users to open the malicious attachments, granting you remote access to their systems. Your mission culminates in accessing the coveted "flag" files hidden in each victim's home directory, which you will submit as proof of your success. This lab offers a unique opportunity to understand how cybersecurity threats exploit human psychology, providing a practical foundation to enhance cyber awareness and strengthen defenses against these deceptive tactics. - https://docs.google.com/document/d/1Yb28GYRLD0Ihnb5oeFp-TGurhb8BZfm_qFbSSrGEknI/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/cyber_security_landscape/3-phishing/ ctf-lab lab-sheet easy diff --git a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml index 6b9392e3f..2d29fef1e 100644 --- a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml +++ b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml @@ -15,7 +15,7 @@ In the home directory of your VM there are a series of encoding and encryption CTF challenges for you to complete, to put your knowledge into practice. - https://docs.google.com/document/d/1wKm2c7yxhM-9GnAiS_Mgvk_8-H7FKEBeGeMc6H0KlwA/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/cyber_security_landscape/4-encoding-encryption/ ctf-lab hackerbot-lab diff --git a/scenarios/labs/web_security/1_intro_web_security.xml b/scenarios/labs/web_security/1_intro_web_security.xml index 1f816212e..aa34ff080 100644 --- a/scenarios/labs/web_security/1_intro_web_security.xml +++ b/scenarios/labs/web_security/1_intro_web_security.xml @@ -12,7 +12,7 @@ In this lab you will delve into concepts and practical exercises that will equip Throughout this lab, you will learn by doing, actively engaging in activities. As part of the hands-on experience, you will also work through scored flag-based tasks, such as completing challenges related to Insecure Direct Object References. By the end of the lab, you will have acquired a solid foundation in web security fundamentals, simulation of web server activities, and practical skills in using tools like ZAP for security testing and assessment. This sets the stage for deeper exploration and learning in subsequent topics, contributing to the development of your web security expertise. - https://docs.google.com/document/d/1vLy56U53lqb8ZpQVLwxznCBsGv0KPM_uXJW1WD5DCiI/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/1-intro-web-security/ ctf-lab lab-sheet diff --git a/scenarios/labs/web_security/2_sessions_and_cookies.xml b/scenarios/labs/web_security/2_sessions_and_cookies.xml index a7deff0c3..a2c7be3ef 100644 --- a/scenarios/labs/web_security/2_sessions_and_cookies.xml +++ b/scenarios/labs/web_security/2_sessions_and_cookies.xml @@ -11,7 +11,7 @@ In this web security lab you will delve into sessions and cookies. The relevance Throughout the lab, you will learn to self-host PHP pages, use OWASP Zap to analyze and manipulate cookies, and comprehend the nuances of session cookies. The DVWA challenges offer a real-world application of your knowledge, requiring you to assess and exploit vulnerabilities at different security levels. For instance, you will investigate weaknesses in session ID generation, analyze source code for session IDs, and assess the security implications of various approaches. Additionally, CTF tasks in Security Shepherd will provide hands-on experiences in session management, poor data validation, and security misconfigurations. By completing these challenges, you will develop practical skills addressing complex security scenarios mirroring the challenges faced by penetration testers and ethical hackers in real-world scenarios. - https://docs.google.com/document/d/1xcbf0bqtdMGgJAjeedw5MUbkRosMyQ_UZ0gN4IeCBFs/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/2-sessions-and-cookies/ lab-environment ctf-lab diff --git a/scenarios/labs/web_security/3_xss.xml b/scenarios/labs/web_security/3_xss.xml index 3b6662697..26c7f16da 100644 --- a/scenarios/labs/web_security/3_xss.xml +++ b/scenarios/labs/web_security/3_xss.xml @@ -12,7 +12,7 @@ In this web security lab you will delve into the critical realm of web applicati Throughout this lab, you will engage with various learning resources, including Damn Vulnerable Web App (DVWA), OWASP WebGoat and WebWolf, and OWASP Security Shepherd. The hands-on activities involve creating and manipulating PHP pages, implementing XSS filters, and exploring vulnerabilities in web applications using DVWA challenges. You will also work with WebGoat and Security Shepherd to further validate your understanding of XSS attacks in different scenarios. By the end of this lab, you will have gained practical insights into identifying, exploiting, and mitigating XSS vulnerabilities, a crucial skill in the field of web security. - https://docs.google.com/document/d/1f7hD_sZnBChklLZmskpxp1dIJUG9Ntw_06t76ltnPTk/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/3-xss/ lab-environment ctf-lab diff --git a/scenarios/labs/web_security/4_sqli.xml b/scenarios/labs/web_security/4_sqli.xml index 4f3fc1aff..583caae3f 100644 --- a/scenarios/labs/web_security/4_sqli.xml +++ b/scenarios/labs/web_security/4_sqli.xml @@ -12,7 +12,7 @@ In this web security lab you will delve into the critical realm of SQL injection Throughout this lab, you will engage in a series of tasks across various platforms. Starting with WebGoat, you will log in and progress through SQL injection exercises, honing your skills in crafting attacks and understanding mitigation strategies. In DVWA challenges, you will undertake guided walk-throughs at low, medium, and high security levels to retrieve passwords, crack hashed passwords, and master blind SQL injection. Further, Security Shepherd tasks will enhance your skills in session management and SQL injection, reinforcing your ability to apply theoretical concepts in real-world scenarios. By the end, you will have not only learned about SQL injection but also independently completed challenges, solidifying your expertise in securing web applications against this pervasive security threat. - https://docs.google.com/document/d/1G_b4f25ufopbDw6djpO1D-nhbJ7vFOCY-QZJtoTUSKg/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/4-sqli/ lab-environment ctf-lab diff --git a/scenarios/labs/web_security/5_sqli_advanced.xml b/scenarios/labs/web_security/5_sqli_advanced.xml index 5f76f1c90..549926e5e 100644 --- a/scenarios/labs/web_security/5_sqli_advanced.xml +++ b/scenarios/labs/web_security/5_sqli_advanced.xml @@ -12,7 +12,7 @@ In this web security lab you will delve into the intricacies of injection attack Throughout the lab, you will engage with various vulnerable environments, including Damn Vulnerable Web App (DVWA), OWASP WebGoat, and OWASP Security Shepherd. Practical tasks include exploiting SQL injection in DVWA with different security levels, automating SQL injection attacks using sqlmap, and tackling blind SQL injection scenarios. Additionally, you will apply your knowledge to WebGoat, a web application specifically designed for learning security concepts, and complete CTF challenges in Security Shepherd. By the end of the lab, you will have gained hands-on experience in identifying, exploiting, and mitigating OS command injection and SQL injection vulnerabilities, crucial skills for securing web applications in real-world scenarios. - https://docs.google.com/document/d/1tj7qQ-1HbmxXaZNMOCPVECHrFAHpkRVcD_Q0FvMhIWQ/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/5-sqli-advanced/ lab-environment ctf-lab diff --git a/scenarios/labs/web_security/6_csrf.xml b/scenarios/labs/web_security/6_csrf.xml index e516b7955..1e07a08ff 100644 --- a/scenarios/labs/web_security/6_csrf.xml +++ b/scenarios/labs/web_security/6_csrf.xml @@ -12,7 +12,7 @@ In this web security lab focused on Cross-Site Request Forgery (CSRF), you will Throughout the lab, you will engage in hands-on tasks that mirror real-world scenarios. For instance, you'll create an external form using vi text editor, host it with WebWolf, and understand the parameters necessary for a POST request. In DVWA challenges, you'll manipulate HTML forms to exploit vulnerabilities at low, medium, and high security levels. The tasks also extend to combining CSRF with XSS to overcome anti-CSRF measures. By the end of the lab, you'll have a comprehensive understanding of CSRF attacks, CORS limitations, and practical skills in executing and defending against such attacks, enhancing your expertise in web application security. - https://docs.google.com/document/d/1ABryiNKLDiIG6i7PQUztzzynjPo3fRSBP4OakxCPraY/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/6-csrf/ lab-environment ctf-lab diff --git a/scenarios/labs/web_security/7_additional_web.xml b/scenarios/labs/web_security/7_additional_web.xml index 32679fd8b..78de0cf58 100644 --- a/scenarios/labs/web_security/7_additional_web.xml +++ b/scenarios/labs/web_security/7_additional_web.xml @@ -10,7 +10,7 @@ # Introduction Web and Network Security additional CTF challenges. - https://docs.google.com/document/d/1DDjyBGtB9vaFD6S2s1jQn7_bpVn4UlK-njbmVX5_UiM/edit?usp=sharing + https://cliffe.github.io/HacktivityLabSheets/labs/web_security/7-additional-web/ lab-environment ctf-lab