diff --git a/README-CyBOK-Scenarios-Indexed.md b/README-CyBOK-Scenarios-Indexed.md
index 81a730d1a..c66baee96 100644
--- a/README-CyBOK-Scenarios-Indexed.md
+++ b/README-CyBOK-Scenarios-Indexed.md
@@ -2,7 +2,7 @@
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video lectures for scenarios are tagged with CyBOK associations.
-This file is an autogenerated index and cross referencing of the 104 SecGen lab scenarios that have CyBOK metadata.
+This file is an autogenerated index and cross referencing of the 106 SecGen practical lab scenarios that have CyBOK metadata.
You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-cybok-knowledge-area-ka). The [list of scenarios](#scenario-cybok-keywords) in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).
@@ -12,10 +12,12 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
# Scenarios Indexed By CyBOK Knowledge Area (KA)
+[Human Factors (HF)](#human-factors-hf)
+[Adversarial Behaviours (AB)](#adversarial-behaviours-ab)
+[Malware & Attack Technology (MAT)](#malware--attack-technology-mat)
+[Applied Cryptography (AC)](#applied-cryptography-ac)
[Network Security (NS)](#network-security-ns)
[Security Operations & Incident Management (SOIM)](#security-operations--incident-management-soim)
-[Malware & Attack Technology (MAT)](#malware--attack-technology-mat)
-[Adversarial Behaviours (AB)](#adversarial-behaviours-ab)
[Software Security (SS)](#software-security-ss)
[Authentication, Authorisation & Accountability (AAA)](#authentication,-authorisation--accountability-aaa)
[Operating Systems & Virtualisation (OSV)](#operating-systems--virtualisation-osv)
@@ -25,6 +27,53 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
[Cryptography (C)](#cryptography-c)
+## Human Factors (HF)
+
+### HF Scenarios
+
+[cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)
+### HF Scenarios by Topics
+| Topic | Scenario |
+| --- | --- |
+Human Error | [cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)
+
+## Adversarial Behaviours (AB)
+
+### AB Scenarios
+
+[cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)[introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/grfics.xml](#labtainersgrficsxml)
+### AB Scenarios by Topics
+| Topic | Scenario |
+| --- | --- |
+Attacks | [cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)
+Models | [introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/grfics.xml](#labtainersgrficsxml)
+
+## Malware & Attack Technology (MAT)
+
+### MAT Scenarios
+
+[cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)[introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[introducing_attacks/3_vulnerabilities.xml](#introducing_attacks3_vulnerabilitiesxml)[introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[introducing_attacks/8_vulnerability_analysis.xml](#introducing_attacks8_vulnerability_analysisxml)[labtainers/acl-hackerbot-flags.xml](#labtainersacl-hackerbot-flagsxml)[labtainers/acl.xml](#labtainersaclxml)[labtainers/bufoverflow.xml](#labtainersbufoverflowxml)[labtainers/formatstring.xml](#labtainersformatstringxml)[labtainers/gdblesson.xml](#labtainersgdblessonxml)[labtainers/ida.xml](#labtainersidaxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)[labtainers/retlibc.xml](#labtainersretlibcxml)[labtainers/snort.xml](#labtainerssnortxml)[response_and_investigation/4_ids.xml](#response_and_investigation4_idsxml)[response_and_investigation/5_ids_rules.xml](#response_and_investigation5_ids_rulesxml)[response_and_investigation/7_live_analysis.xml](#response_and_investigation7_live_analysisxml)[response_and_investigation/8_dead_analysis.xml](#response_and_investigation8_dead_analysisxml)[software_and_malware_analysis/10_anti_sre.xml](#software_and_malware_analysis10_anti_srexml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/2_intro_to_c.xml](#software_and_malware_analysis2_intro_to_cxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)[software_and_malware_analysis/4_asm.xml](#software_and_malware_analysis4_asmxml)[software_and_malware_analysis/5_ghidra.xml](#software_and_malware_analysis5_ghidraxml)[software_and_malware_analysis/6_ghidra_analysis.xml](#software_and_malware_analysis6_ghidra_analysisxml)[software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml](#software_and_malware_analysis6_ghidra_with_live_malware_samplesxml)[software_and_malware_analysis/7_dynamic.xml](#software_and_malware_analysis7_dynamicxml)[software_and_malware_analysis/8_dynamic_continued.xml](#software_and_malware_analysis8_dynamic_continuedxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)[software_security_exploitation/4_exploit_development.xml](#software_security_exploitation4_exploit_developmentxml)[software_security_exploitation/5_linux_stack_bof.xml](#software_security_exploitation5_linux_stack_bofxml)[software_security_exploitation/6_linux_nx_bypass.xml](#software_security_exploitation6_linux_nx_bypassxml)[software_security_exploitation/7_linux_aslr_bypass.xml](#software_security_exploitation7_linux_aslr_bypassxml)[software_security_exploitation/8_linux_bof_format.xml](#software_security_exploitation8_linux_bof_formatxml)
+### MAT Scenarios by Topics
+| Topic | Scenario |
+| --- | --- |
+Attacks and exploitation | [cyber_security_landscape/3_phishing.xml](#cyber_security_landscape3_phishingxml)[introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[introducing_attacks/3_vulnerabilities.xml](#introducing_attacks3_vulnerabilitiesxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[introducing_attacks/8_vulnerability_analysis.xml](#introducing_attacks8_vulnerability_analysisxml)[labtainers/bufoverflow.xml](#labtainersbufoverflowxml)[labtainers/formatstring.xml](#labtainersformatstringxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)[labtainers/retlibc.xml](#labtainersretlibcxml)[software_security_exploitation/4_exploit_development.xml](#software_security_exploitation4_exploit_developmentxml)[software_security_exploitation/5_linux_stack_bof.xml](#software_security_exploitation5_linux_stack_bofxml)[software_security_exploitation/6_linux_nx_bypass.xml](#software_security_exploitation6_linux_nx_bypassxml)[software_security_exploitation/7_linux_aslr_bypass.xml](#software_security_exploitation7_linux_aslr_bypassxml)[software_security_exploitation/8_linux_bof_format.xml](#software_security_exploitation8_linux_bof_formatxml)
+Malware Taxonomy | [introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)
+Malware Analysis | [introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[labtainers/gdblesson.xml](#labtainersgdblessonxml)[labtainers/ida.xml](#labtainersidaxml)[software_and_malware_analysis/10_anti_sre.xml](#software_and_malware_analysis10_anti_srexml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)[software_and_malware_analysis/4_asm.xml](#software_and_malware_analysis4_asmxml)[software_and_malware_analysis/5_ghidra.xml](#software_and_malware_analysis5_ghidraxml)[software_and_malware_analysis/6_ghidra_analysis.xml](#software_and_malware_analysis6_ghidra_analysisxml)[software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml](#software_and_malware_analysis6_ghidra_with_live_malware_samplesxml)[software_and_malware_analysis/7_dynamic.xml](#software_and_malware_analysis7_dynamicxml)[software_and_malware_analysis/8_dynamic_continued.xml](#software_and_malware_analysis8_dynamic_continuedxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)
+Malicious Activities by Malware | [introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)
+MALCODE/MALWARE | [labtainers/acl-hackerbot-flags.xml](#labtainersacl-hackerbot-flagsxml)[labtainers/acl.xml](#labtainersaclxml)
+Malware Detection | [labtainers/snort.xml](#labtainerssnortxml)[response_and_investigation/4_ids.xml](#response_and_investigation4_idsxml)[response_and_investigation/5_ids_rules.xml](#response_and_investigation5_ids_rulesxml)[response_and_investigation/7_live_analysis.xml](#response_and_investigation7_live_analysisxml)[response_and_investigation/8_dead_analysis.xml](#response_and_investigation8_dead_analysisxml)
+Technical Underpinning | [software_and_malware_analysis/2_intro_to_c.xml](#software_and_malware_analysis2_intro_to_cxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)
+
+## Applied Cryptography (AC)
+
+### AC Scenarios
+
+[cyber_security_landscape/4_encoding_encryption.xml](#cyber_security_landscape4_encoding_encryptionxml)
+### AC Scenarios by Topics
+| Topic | Scenario |
+| --- | --- |
+Algorithms, Schemes and Protocols | [cyber_security_landscape/4_encoding_encryption.xml](#cyber_security_landscape4_encoding_encryptionxml)
+
## Network Security (NS)
### NS Scenarios
@@ -56,32 +105,6 @@ INCIDENT RESPONSE | [labtainers/backups.xml](#labtainersbackupsxml)[labtain
CM (CONFIGURATION MANAGEMENT) | [labtainers/denyhost.xml](#labtainersdenyhostxml)[labtainers/nmap-ssh.xml](#labtainersnmap-sshxml)
Analyse: Analysis Methods | [labtainers/snort.xml](#labtainerssnortxml)[response_and_investigation/4_ids.xml](#response_and_investigation4_idsxml)[response_and_investigation/5_ids_rules.xml](#response_and_investigation5_ids_rulesxml)[response_and_investigation/6_exfiltration_detection.xml](#response_and_investigation6_exfiltration_detectionxml)
-## Malware & Attack Technology (MAT)
-
-### MAT Scenarios
-
-[introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[introducing_attacks/3_vulnerabilities.xml](#introducing_attacks3_vulnerabilitiesxml)[introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[introducing_attacks/8_vulnerability_analysis.xml](#introducing_attacks8_vulnerability_analysisxml)[labtainers/acl-hackerbot-flags.xml](#labtainersacl-hackerbot-flagsxml)[labtainers/acl.xml](#labtainersaclxml)[labtainers/bufoverflow.xml](#labtainersbufoverflowxml)[labtainers/formatstring.xml](#labtainersformatstringxml)[labtainers/gdblesson.xml](#labtainersgdblessonxml)[labtainers/ida.xml](#labtainersidaxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)[labtainers/retlibc.xml](#labtainersretlibcxml)[labtainers/snort.xml](#labtainerssnortxml)[response_and_investigation/4_ids.xml](#response_and_investigation4_idsxml)[response_and_investigation/5_ids_rules.xml](#response_and_investigation5_ids_rulesxml)[response_and_investigation/7_live_analysis.xml](#response_and_investigation7_live_analysisxml)[response_and_investigation/8_dead_analysis.xml](#response_and_investigation8_dead_analysisxml)[software_and_malware_analysis/10_anti_sre.xml](#software_and_malware_analysis10_anti_srexml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/2_intro_to_c.xml](#software_and_malware_analysis2_intro_to_cxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)[software_and_malware_analysis/4_asm.xml](#software_and_malware_analysis4_asmxml)[software_and_malware_analysis/5_ghidra.xml](#software_and_malware_analysis5_ghidraxml)[software_and_malware_analysis/6_ghidra_analysis.xml](#software_and_malware_analysis6_ghidra_analysisxml)[software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml](#software_and_malware_analysis6_ghidra_with_live_malware_samplesxml)[software_and_malware_analysis/7_dynamic.xml](#software_and_malware_analysis7_dynamicxml)[software_and_malware_analysis/8_dynamic_continued.xml](#software_and_malware_analysis8_dynamic_continuedxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)[software_security_exploitation/4_exploit_development.xml](#software_security_exploitation4_exploit_developmentxml)[software_security_exploitation/5_linux_stack_bof.xml](#software_security_exploitation5_linux_stack_bofxml)[software_security_exploitation/6_linux_nx_bypass.xml](#software_security_exploitation6_linux_nx_bypassxml)[software_security_exploitation/7_linux_aslr_bypass.xml](#software_security_exploitation7_linux_aslr_bypassxml)[software_security_exploitation/8_linux_bof_format.xml](#software_security_exploitation8_linux_bof_formatxml)
-### MAT Scenarios by Topics
-| Topic | Scenario |
-| --- | --- |
-Malware Taxonomy | [introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)
-Malware Analysis | [introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[labtainers/gdblesson.xml](#labtainersgdblessonxml)[labtainers/ida.xml](#labtainersidaxml)[software_and_malware_analysis/10_anti_sre.xml](#software_and_malware_analysis10_anti_srexml)[software_and_malware_analysis/1_dynamic_and_static_analysis.xml](#software_and_malware_analysis1_dynamic_and_static_analysisxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)[software_and_malware_analysis/4_asm.xml](#software_and_malware_analysis4_asmxml)[software_and_malware_analysis/5_ghidra.xml](#software_and_malware_analysis5_ghidraxml)[software_and_malware_analysis/6_ghidra_analysis.xml](#software_and_malware_analysis6_ghidra_analysisxml)[software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml](#software_and_malware_analysis6_ghidra_with_live_malware_samplesxml)[software_and_malware_analysis/7_dynamic.xml](#software_and_malware_analysis7_dynamicxml)[software_and_malware_analysis/8_dynamic_continued.xml](#software_and_malware_analysis8_dynamic_continuedxml)[software_and_malware_analysis/9_malware_behaviour.xml](#software_and_malware_analysis9_malware_behaviourxml)
-Attacks and exploitation | [introducing_attacks/2_malware_msf_payloads.xml](#introducing_attacks2_malware_msf_payloadsxml)[introducing_attacks/3_vulnerabilities.xml](#introducing_attacks3_vulnerabilitiesxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[introducing_attacks/8_vulnerability_analysis.xml](#introducing_attacks8_vulnerability_analysisxml)[labtainers/bufoverflow.xml](#labtainersbufoverflowxml)[labtainers/formatstring.xml](#labtainersformatstringxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)[labtainers/retlibc.xml](#labtainersretlibcxml)[software_security_exploitation/4_exploit_development.xml](#software_security_exploitation4_exploit_developmentxml)[software_security_exploitation/5_linux_stack_bof.xml](#software_security_exploitation5_linux_stack_bofxml)[software_security_exploitation/6_linux_nx_bypass.xml](#software_security_exploitation6_linux_nx_bypassxml)[software_security_exploitation/7_linux_aslr_bypass.xml](#software_security_exploitation7_linux_aslr_bypassxml)[software_security_exploitation/8_linux_bof_format.xml](#software_security_exploitation8_linux_bof_formatxml)
-Malicious Activities by Malware | [introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/metasploit.xml](#labtainersmetasploitxml)
-MALCODE/MALWARE | [labtainers/acl-hackerbot-flags.xml](#labtainersacl-hackerbot-flagsxml)[labtainers/acl.xml](#labtainersaclxml)
-Malware Detection | [labtainers/snort.xml](#labtainerssnortxml)[response_and_investigation/4_ids.xml](#response_and_investigation4_idsxml)[response_and_investigation/5_ids_rules.xml](#response_and_investigation5_ids_rulesxml)[response_and_investigation/7_live_analysis.xml](#response_and_investigation7_live_analysisxml)[response_and_investigation/8_dead_analysis.xml](#response_and_investigation8_dead_analysisxml)
-Technical Underpinning | [software_and_malware_analysis/2_intro_to_c.xml](#software_and_malware_analysis2_intro_to_cxml)[software_and_malware_analysis/3_c_and_asm.xml](#software_and_malware_analysis3_c_and_asmxml)
-
-## Adversarial Behaviours (AB)
-
-### AB Scenarios
-
-[introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/grfics.xml](#labtainersgrficsxml)
-### AB Scenarios by Topics
-| Topic | Scenario |
-| --- | --- |
-Models | [introducing_attacks/4_dns_footprinting.xml](#introducing_attacks4_dns_footprintingxml)[introducing_attacks/5_scanning.xml](#introducing_attacks5_scanningxml)[introducing_attacks/6_exploitation.xml](#introducing_attacks6_exploitationxml)[introducing_attacks/7_post-exploitation.xml](#introducing_attacks7_post-exploitationxml)[labtainers/grfics.xml](#labtainersgrficsxml)
-
## Software Security (SS)
### SS Scenarios
@@ -172,6 +195,66 @@ Symmetric Cryptography | [labtainers/symkeylab.xml](#labtainerssymkeylabxml) IntroductionHumans play a crucial role in the cyber security of systems and information. Many attacks target users and their mental models of cyber security systems and risk. For example, if an attacker can trick a user into performing tasks for them, the attacker can achieve their goals and gain access that they are not authorised to. |
+|Lab sheet | https://docs.google.com/document/d/1Yb28GYRLD0Ihnb5oeFp-TGurhb8BZfm_qFbSSrGEknI/edit?usp=sharing |
+|Type | ctf-lab; lab-sheet |
+|Author | Z. Cliffe Schreuders |
+|Linked videos| |
+|VM names| victim_server; kali |
+
+
+
+ ### CyBOK KAs, Topics, and Keywords
+| KA | Topic | Keywords
+| --- | --- | --- |
+| Human Factors (HF) | Human Error | latent usability failures in systems-of-systems |
+| Adversarial Behaviours (AB) | Attacks | SOCIAL ENGINEERING; MALICIOUS ACTIVITIES BY MALICIOUS ATTACHMENTS |
+| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION FRAMEWORKS; MALCODE/MALWARE - SOCIAL ENGINEERING - BAITING; MALCODE/MALWARE - SOCIAL ENGINEERING - PRETEXTING; MALCODE/MALWARE - VIRUSES - COUNTERMEASUMALCODE/MALWARE - VIRUSES - MACRO VIRUSES; MALCODE/MALWARE - SPAM . . . . .MALCODE/MALWARE - SPOOFING |
+
+
+Command to build VMs and start scenario:
+
+```ruby secgen.rb -s scenarios/labs/cyber_security_landscape/3_phishing.xml run```
+
+[View source](scenarios/labs/cyber_security_landscape/3_phishing.xml)
+
+
+ ## cyber_security_landscape/4_encoding_encryption.xml
+
+ ### Details
+
+| Key | Data |
+| --- | --- |
+|Name | Encoding and Encryption Lab |
+|Description | Decode the files in your home directory. |
+|Lab sheet | |
+|Type | ctf-lab; hackerbot-lab; lab-sheet |
+|Author | Z. Cliffe Schreuders |
+|Linked videos| |
+|VM names| desktop |
+
+
+
+ ### CyBOK KAs, Topics, and Keywords
+| KA | Topic | Keywords
+| --- | --- | --- |
+| Applied Cryptography (AC) | Algorithms, Schemes and Protocols | Encoding vs Cryptography; Caesar cipher; Vigenere cipher; SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD) |
+
+
+Command to build VMs and start scenario:
+
+```ruby secgen.rb -s scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml run```
+
+[View source](scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml)
+
+
## introducing_attacks/1_intro_linux.xml
### Details
@@ -179,10 +262,11 @@ Symmetric Cryptography | [labtainers/symkeylab.xml](#labtainerssymkeylabxml) IntroductionThis topic covers lots of ground regarding fundamentals of Linux and free open source software (FOSS). Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_1_Intro_to_Unix_FOSS_and_Linux.html) Reading[Chapters 1 "Introduction" and 2 "Unix History and Lineage": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](http://www.dawsonera.com.ezproxy.leedsbeckett.ac.uk/depp/reader/protected/external/AbstractView/S9781449310325)Suggested:Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) Lab[Lab sheet here](https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing). |
+|Description | IntroductionThis topic covers lots of ground regarding fundamentals of Linux and free open source software (FOSS). Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_1_Intro_to_Unix_FOSS_and_Linux.html) Reading[Chapters 1 "Introduction" and 2 "Unix History and Lineage": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](http://www.dawsonera.com.ezproxy.leedsbeckett.ac.uk/depp/reader/protected/external/AbstractView/S9781449310325)Suggested:Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) |
+|Lab sheet | https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop; kali |
@@ -208,10 +292,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Malware and an Introduction to Metasploit and Payloads |
-|Description | IntroductionThis week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program. Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html) Reading[Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library](http://www.dawsonera.com.ezproxy.leedsbeckett.ac.uk/depp/reader/protected/external/AbstractView/S9781449310325)Suggested:Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779)Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) Lab[Lab sheet here](https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing). |
+|Description | IntroductionThis week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program. Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html) Reading[Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library](http://www.dawsonera.com.ezproxy.leedsbeckett.ac.uk/depp/reader/protected/external/AbstractView/S9781449310325)Suggested:Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779)Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) |
+|Lab sheet | https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing |
|Type | lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| windows_victim; kali |
@@ -239,10 +324,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Vulnerabilities, Exploits, and Remote Access Payloads |
-|Description | IntroductionThis week we will cover one of the major threats in computer security: software vulnerabilities. You will learn about the danger these pose, and start to learn about the power of the Metasploit framework, a popular hacking and penetration testing tool. You will learn and apply a number of important concepts such as payloads, shell code, bind and reverse shells, and both remote and local (client-side) exploits. Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_3_Vulnerabilities.html) Reading[Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071742566) Lab[Lab sheet here](https://docs.google.com/document/d/11I8xMUXrT5ArJIsAhwGDtQ4RkH4l9CR4C2wh9_wz8xM/edit?usp=sharing). |
+|Description | IntroductionThis week we will cover one of the major threats in computer security: software vulnerabilities. You will learn about the danger these pose, and start to learn about the power of the Metasploit framework, a popular hacking and penetration testing tool. You will learn and apply a number of important concepts such as payloads, shell code, bind and reverse shells, and both remote and local (client-side) exploits. Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_3_Vulnerabilities.html) Reading[Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071742566) |
+|Lab sheet | https://docs.google.com/document/d/11I8xMUXrT5ArJIsAhwGDtQ4RkH4l9CR4C2wh9_wz8xM/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| windows_victim; linux_victim_server; kali |
@@ -268,10 +354,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Information Gathering: Footprinting |
-|Description | IntroductionThe topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to). Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_4_Information_gathering.html) Reading[Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071613750) Lab[Lab sheet here](https://docs.google.com/document/d/1Whs4c_mN7fFjtrYgg_uzmCGBH_EYjr7fTAgoM-OZTqQ/edit?usp=sharing). |
+|Description | IntroductionThe topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to). Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_4_Information_gathering.html) Reading[Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071613750) |
+|Lab sheet | https://docs.google.com/document/d/1Whs4c_mN7fFjtrYgg_uzmCGBH_EYjr7fTAgoM-OZTqQ/edit?usp=sharing |
|Type | lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| kali |
@@ -299,10 +386,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Information Gathering: Scanning |
-|Description | IntroductionThis week we learn how to scan networks to get an understanding of and to map out a network. Scanning is a critical stage for an attacker, since it can give them the information they need in order to launch an attack. Reading[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551) Lab[Lab sheet here](https://docs.google.com/document/d/1KScKw7M4Bt_FE5F_2tI6tnK1NrKNAJkyh5F2TpOh9hA/edit?usp=sharing). |
+|Description | IntroductionThis week we learn how to scan networks to get an understanding of and to map out a network. Scanning is a critical stage for an attacker, since it can give them the information they need in order to launch an attack. Reading[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551) |
+|Lab sheet | https://docs.google.com/document/d/1KScKw7M4Bt_FE5F_2tI6tnK1NrKNAJkyh5F2TpOh9hA/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| linux_victim_server; kali |
@@ -330,10 +418,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | From Scanning to Exploitation |
-|Description | IntroductionThis week we learn how we can scan networks to discover vulnerable services, and exploit them. Reading[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551) Lab[Lab sheet here](https://docs.google.com/document/d/1puLuKwqiFMTAZhMKKLhS_aK7kKwWnKw1e3StJBiFmFA/edit?usp=sharing). |
+|Description | IntroductionThis week we learn how we can scan networks to discover vulnerable services, and exploit them. Reading[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551) |
+|Lab sheet | https://docs.google.com/document/d/1puLuKwqiFMTAZhMKKLhS_aK7kKwWnKw1e3StJBiFmFA/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| windows_server; linux_server; kali |
@@ -362,10 +451,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Post-exploitation |
-|Description | IntroductionOnce an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful. Suggested reading[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits) Lab[Lab sheet here](https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing). |
+|Description | IntroductionOnce an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful. Suggested reading[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits) |
+|Lab sheet | https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| windows_server; linux_server; kali |
@@ -393,10 +483,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Vulnerability Analysis |
-|Description | IntroductionIt is important for organisations to manage the security of their systems and for security professionals to efficiently scan networks for vulnerabilities. Lab[Lab sheet here](https://docs.google.com/document/d/1rdNcOmYOjsRu97Gh3ds8HbTpORGxbMcd2Q7U4TATIbw/edit?usp=sharing). |
+|Description | IntroductionIt is important for organisations to manage the security of their systems and for security professionals to efficiently scan networks for vulnerabilities. |
+|Lab sheet | https://docs.google.com/document/d/1rdNcOmYOjsRu97Gh3ds8HbTpORGxbMcd2Q7U4TATIbw/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| linux_server; kali |
@@ -422,10 +513,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: acl |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop; hackerbot_server |
@@ -454,10 +546,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: acl |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -486,10 +579,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: arp-spoof |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -515,10 +609,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: backups |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -544,10 +639,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: backups2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -573,10 +669,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: bufoverflow |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -603,10 +700,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: capabilities |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -632,10 +730,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: centos-log |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -660,10 +759,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: centos-log2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -688,10 +788,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: denyhost |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -718,10 +819,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: dmz-example |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -746,10 +848,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: dmz-lab |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -774,10 +877,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: file-deletion |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -802,10 +906,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: file-integrity |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -832,10 +937,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: formatstring |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -861,10 +967,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: gdblesson |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -889,10 +996,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: grassmarlin |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -919,10 +1027,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: grfics |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -950,10 +1059,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: ida |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -978,10 +1088,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: iptables-ics |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1010,10 +1121,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: iptables |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1040,10 +1152,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: iptables2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1070,10 +1183,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: ldap |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1100,10 +1214,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: local-dns |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1128,10 +1243,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: macs-hash |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1158,10 +1274,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: metasploit |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1188,10 +1305,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: nix-commands |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1217,10 +1335,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: nmap-discovery |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1245,10 +1364,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: nmap-ssh |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1274,10 +1394,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: onewayhash |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1304,10 +1425,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: packet-introspection |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1333,10 +1455,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: pass-crack |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1362,10 +1485,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: pcapanalysis |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1392,10 +1516,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: plc-app |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1421,10 +1546,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: plc-forensics-adv |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1450,10 +1576,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: plc-forensics |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1479,10 +1606,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: plc |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1508,10 +1636,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: pubkey |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1537,10 +1666,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: radius |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1566,10 +1696,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: remote-dns |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1594,10 +1725,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: retlibc |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1624,10 +1756,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: routing-basics |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1652,10 +1785,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: routing-basics2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1680,10 +1814,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: setuid-env |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1709,10 +1844,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: snort |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1741,10 +1877,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: softplc |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1770,10 +1907,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: softplc2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1799,10 +1937,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: sql-inject |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1829,10 +1968,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: ssh-agent |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1857,10 +1997,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: sshlab |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1885,10 +2026,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: ssl |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1915,10 +2057,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: symkeylab |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1944,10 +2087,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: sys-log |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -1972,10 +2116,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: tcpip |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2001,10 +2146,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: telnetlab |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2030,10 +2176,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: vpnlab |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2058,10 +2205,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: vpnlab2 |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2086,10 +2234,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: webtrack |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2115,10 +2264,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: wireshark-intro |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2143,10 +2293,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: xforge |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2172,10 +2323,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Labtainers lab: xsite |
-|Description | A Labtainers lab.|
+|Description | A Labtainers lab. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| desktop |
@@ -2201,10 +2353,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Integrity protection lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Protecting integrity with file attributes; Protecting integrity with read-only filesystems.|
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Protecting integrity with file attributes; Protecting integrity with read-only filesystems. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://www.youtube.com/watch?v=sv1pHuuoW9g; https://www.youtube.com/watch?v=grISRv-CuHE|
+|Linked videos| https://www.youtube.com/watch?v=sv1pHuuoW9g; https://www.youtube.com/watch?v=grISRv-CuHE |
|VM names| desktop; hackerbot_server |
@@ -2230,10 +2383,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Integrity detection lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Detecting changes to resources using backups; File integrity checkers; Detecting changes to resources using package management.|
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Detecting changes to resources using backups; File integrity checkers; Detecting changes to resources using package management. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://www.youtube.com/watch?v=qzyEdeQ_7ZY; https://www.youtube.com/watch?v=kz7m-iyzSOw|
+|Linked videos| https://www.youtube.com/watch?v=qzyEdeQ_7ZY; https://www.youtube.com/watch?v=kz7m-iyzSOw |
|VM names| desktop; hackerbot_server |
@@ -2260,10 +2414,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Backups lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Rsync, and backups and restoring data using differential and incremental backups.|
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Rsync, and backups and restoring data using differential and incremental backups. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/lak1Sued4GY; https://youtu.be/stVomGROfbQ; https://youtu.be/n8IKEJUOISY|
+|Linked videos| https://youtu.be/lak1Sued4GY; https://youtu.be/stVomGROfbQ; https://youtu.be/n8IKEJUOISY |
|VM names| desktop; backup_server; hackerbot_server |
@@ -2288,10 +2443,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | IDS lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/raR0HstMnjg; https://youtu.be/3oDVTSFhl8Y; https://youtu.be/M6MisvbU32M|
+|Linked videos| https://youtu.be/raR0HstMnjg; https://youtu.be/3oDVTSFhl8Y; https://youtu.be/M6MisvbU32M |
|VM names| desktop; ids_snoop; web_server; hackerbot_server |
@@ -2320,10 +2476,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | IDS rules lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/ZUMBsMppsLo; https://youtu.be/nuUm4NO_S1s|
+|Linked videos| https://youtu.be/ZUMBsMppsLo; https://youtu.be/nuUm4NO_S1s |
|VM names| desktop; ids_snoop; web_server; hackerbot_server |
@@ -2351,10 +2508,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Exfiltration detection lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/4zYn4hbwKYQ; https://youtu.be/Y32tmFrCEBk|
+|Linked videos| https://youtu.be/4zYn4hbwKYQ; https://youtu.be/Y32tmFrCEBk |
|VM names| desktop; ids_snoop; web_server; hackerbot_server |
@@ -2382,10 +2540,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Live analysis lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/aNvVtF437LI; https://www.youtube.com/watch?v=iUInvMrBw3k; https://youtu.be/9nyvtJRQ17w|
+|Linked videos| https://youtu.be/aNvVtF437LI; https://www.youtube.com/watch?v=iUInvMrBw3k; https://youtu.be/9nyvtJRQ17w |
|VM names| desktop; compromised_server; hackerbot_server |
@@ -2413,10 +2572,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Dead analysis lab |
-|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/3kiV0ZJWmMY; https://youtu.be/0EafG4CLwA4|
+|Linked videos| https://youtu.be/3kiV0ZJWmMY; https://youtu.be/0EafG4CLwA4 |
|VM names| desktop; hackerbot_server; kali |
@@ -2443,10 +2603,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Anti-SRE |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. [Lab sheet here](https://docs.google.com/document/d/1UsC3zykLAZwoV7bg5hP2hL1zpdxusjSZ3HVBnwZb5M4/edit?usp=sharing) |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
+|Lab sheet | https://docs.google.com/document/d/1UsC3zykLAZwoV7bg5hP2hL1zpdxusjSZ3HVBnwZb5M4/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| metactf |
@@ -2471,10 +2632,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Introdution to Malware analysis lab |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. [Lab sheet here](https://docs.google.com/document/d/1CRGtnCTOogpEIjl-tLYdZqHBwJt75FpUJTE2xUL9wqI/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. |
+|Lab sheet | https://docs.google.com/document/d/1CRGtnCTOogpEIjl-tLYdZqHBwJt75FpUJTE2xUL9wqI/edit?usp=sharin |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/14Hv_QodLxs; https://youtu.be/quKsZbpvYIY; https://youtu.be/CxZx7b3OPsg; https://youtu.be/3qmmqfBtJio; https://youtu.be/k3NwrFWuhaY|
+|Linked videos| https://youtu.be/14Hv_QodLxs; https://youtu.be/quKsZbpvYIY; https://youtu.be/CxZx7b3OPsg; https://youtu.be/3qmmqfBtJio; https://youtu.be/k3NwrFWuhaY |
|VM names| metactf |
@@ -2500,10 +2662,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Introdution to C lab |
-|Description | An introduction to C. Really important fundamentals. No flags this week. [Lab sheet here](https://docs.google.com/document/d/1qaq8LF6wbe9OvXwAqmLQ_FA-1OTRkRVxjH5O5KRDM2w/edit?usp=sharing). |
+|Description | An introduction to C. Really important fundamentals. No flags this week. |
+|Lab sheet | https://docs.google.com/document/d/1qaq8LF6wbe9OvXwAqmLQ_FA-1OTRkRVxjH5O5KRDM2w/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thalita Vergilio |
-|Linked videos| https://youtu.be/chebVVwj1kM; https://youtu.be/2R4QzDAfzLQ|
+|Linked videos| https://youtu.be/chebVVwj1kM; https://youtu.be/2R4QzDAfzLQ |
|VM names| metactf |
@@ -2528,10 +2691,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | C and Assembly lab |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. This week, we will finish our crash course in C programming by looking at structs, a data type used to represent composite data, memory management, one of the biggest strengths of the C language, and bitwise operators, which you will find particularly helpful when looking at disassembled code. We will then change our focus to assembly language. Starting with some basics, we will familiarise ourselves with the syntax and organisation of decompiled code before moving onto recognising the structures we learned last week in the assembly code. [Lab sheet here](https://docs.google.com/document/d/14bEEdrJb0hGS5sBR-mOTWzCY-ws1LFDza3sIM04Akvg/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. This week, we will finish our crash course in C programming by looking at structs, a data type used to represent composite data, memory management, one of the biggest strengths of the C language, and bitwise operators, which you will find particularly helpful when looking at disassembled code. We will then change our focus to assembly language. Starting with some basics, we will familiarise ourselves with the syntax and organisation of decompiled code before moving onto recognising the structures we learned last week in the assembly code. |
+|Lab sheet | https://docs.google.com/document/d/14bEEdrJb0hGS5sBR-mOTWzCY-ws1LFDza3sIM04Akvg/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thalita Vergilio |
-|Linked videos| https://youtu.be/QbyorEb3WTs|
+|Linked videos| https://youtu.be/QbyorEb3WTs |
|VM names| metactf |
@@ -2557,10 +2721,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Recognising C Code Constructs in Assembly lab |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. We start with understanding how branching and conditionals are represented in assembly. We then move onto learning how to identify the common C code constructs we saw in previous weeks in disassembled code, namely loops, function calls, switch statements, arrays and structs. [Lab sheet here](https://docs.google.com/document/d/1l4tU49JhI65Q85Zv9I1Wm1kaHNENp6iyIwMUhM8j_14/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. We start with understanding how branching and conditionals are represented in assembly. We then move onto learning how to identify the common C code constructs we saw in previous weeks in disassembled code, namely loops, function calls, switch statements, arrays and structs. |
+|Lab sheet | https://docs.google.com/document/d/1l4tU49JhI65Q85Zv9I1Wm1kaHNENp6iyIwMUhM8j_14/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thalita Vergilio |
-|Linked videos| https://youtu.be/8b6JokfEFEo|
+|Linked videos| https://youtu.be/8b6JokfEFEo |
|VM names| metactf |
@@ -2585,10 +2750,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Ghidra lab |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. [Lab sheet here](https://docs.google.com/document/d/1d2l1Z5l3r-DOdt-MG96H8HdhmN2l54dz8TL-8iigxWU/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. |
+|Lab sheet | https://docs.google.com/document/d/1d2l1Z5l3r-DOdt-MG96H8HdhmN2l54dz8TL-8iigxWU/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/0zUmUZoEpC4; https://youtu.be/m73pHO_0vhI|
+|Linked videos| https://youtu.be/0zUmUZoEpC4; https://youtu.be/m73pHO_0vhI |
|VM names| metactf |
@@ -2613,10 +2779,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Ghidra lab analysis |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are two binaries to practice SRE with Ghidra. |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are two binaries to practice SRE with Ghidra. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| metactf |
@@ -2641,10 +2808,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Ghidra lab with LIVE MALWARE SAMPLES |
-|Description | You will find live malware samples in /opt/theZoo. |
+|Description | You will find live malware samples in /opt/theZoo. |
+|Lab sheet | |
|Type | lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| metactf |
@@ -2669,10 +2837,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Dynamic analysis SRE |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. [Lab sheet here](https://docs.google.com/document/d/1EuTmklR3AVxdiYTrzyJ89vHU9UUY2QOn3oU74zQF19k/edit?usp=sharing) |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
+|Lab sheet | https://docs.google.com/document/d/1EuTmklR3AVxdiYTrzyJ89vHU9UUY2QOn3oU74zQF19k/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/6MeJIr3EKKM|
+|Linked videos| https://youtu.be/6MeJIr3EKKM |
|VM names| metactf |
@@ -2697,10 +2866,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Dynamic analysis SRE (cont.) |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. [Lab sheet here](https://docs.google.com/document/d/11A7tZppId1pxbcclZDPr6e-zwWPKqPnJMgyAtcARR2s/edit?usp=sharing) |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
+|Lab sheet | https://docs.google.com/document/d/11A7tZppId1pxbcclZDPr6e-zwWPKqPnJMgyAtcARR2s/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/pExTbDVt0Gw|
+|Linked videos| https://youtu.be/pExTbDVt0Gw |
|VM names| metactf |
@@ -2725,10 +2895,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Malware Behaviour |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
+|Lab sheet | |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/6XMrHyAqD-4; https://youtu.be/KJPeZptzl1U; https://youtu.be/6qeDnjOaRiI|
+|Linked videos| https://youtu.be/6XMrHyAqD-4; https://youtu.be/KJPeZptzl1U; https://youtu.be/6qeDnjOaRiI |
|VM names| metactf |
@@ -2754,10 +2925,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. [Lab sheet here](https://docs.google.com/document/d/1AxTve1RBzqvdPxt8Wziga2x2e3lZp4k5YsMq3KxkXzM/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. |
+|Lab sheet | https://docs.google.com/document/d/1AxTve1RBzqvdPxt8Wziga2x2e3lZp4k5YsMq3KxkXzM/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/jo_07iOplzA; https://youtu.be/1Hy_166CwRk|
+|Linked videos| https://youtu.be/jo_07iOplzA; https://youtu.be/1Hy_166CwRk |
|VM names| desktop |
@@ -2783,10 +2955,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks |
-|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. [Lab sheet here](https://docs.google.com/document/d/1GKmNARyF2-RQ-jK1_w4Y7V9vNtXsJvMmvXSbnadyEoE/edit?usp=sharing). |
+|Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. |
+|Lab sheet | https://docs.google.com/document/d/1GKmNARyF2-RQ-jK1_w4Y7V9vNtXsJvMmvXSbnadyEoE/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/nVpqjsfii6c; https://youtu.be/PH73lpG2B1M; https://youtu.be/Du3fVc_ZLiI|
+|Linked videos| https://youtu.be/nVpqjsfii6c; https://youtu.be/PH73lpG2B1M; https://youtu.be/Du3fVc_ZLiI |
|VM names| desktop |
@@ -2812,10 +2985,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Bug Hunting and Fuzzing |
-|Description | [Lab sheet here](https://docs.google.com/document/d/1yuDcFkI2-KD4Xfti4PahE038o-6324LKSx075ZSsuKw/edit?usp=sharing). |
+|Description | Bug Hunting and Fuzzing |
+|Lab sheet | https://docs.google.com/document/d/1yuDcFkI2-KD4Xfti4PahE038o-6324LKSx075ZSsuKw/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/nwxtlR31hvw; https://youtu.be/vT2PP7VnSNw|
+|Linked videos| https://youtu.be/nwxtlR31hvw; https://youtu.be/vT2PP7VnSNw |
|VM names| windows_victim; kali; desktop |
@@ -2840,10 +3014,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Exploit Development |
-|Description | [Lab sheet here](https://docs.google.com/document/d/1tsKUaCetdqwDmey4JK9DYrcO9XDx4EwE2RIvSbP6zQQ/edit?usp=sharing). |
+|Description | By the end of this lab you will have written a Metasploit exploit module to compromise a remote buffer overflow. |
+|Lab sheet | https://docs.google.com/document/d/1tsKUaCetdqwDmey4JK9DYrcO9XDx4EwE2RIvSbP6zQQ/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/Zh7IdmnCfy0; https://youtu.be/WU06L-u0t2Q; https://youtu.be/j2S-XgY-Fyg; https://youtu.be/Lf1UPaqPJMM; https://youtu.be/5OUQ7ExlgKI|
+|Linked videos| https://youtu.be/Zh7IdmnCfy0; https://youtu.be/WU06L-u0t2Q; https://youtu.be/j2S-XgY-Fyg; https://youtu.be/Lf1UPaqPJMM; https://youtu.be/5OUQ7ExlgKI |
|VM names| windows_victim; kali; windows_victim_server |
@@ -2869,10 +3044,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Writing Exploits: Linux and Stack-smashing Buffer Overflows |
-|Description | [Lab sheet here](https://docs.google.com/document/d/1wgxLYHkdeLknRcbzZY73xZt36TWExuu-lfIJhRuHE-I/). |
+|Description | Exploit Development: Linux and Stack-smashing Buffer Overflows |
+|Lab sheet | https://docs.google.com/document/d/1wgxLYHkdeLknRcbzZY73xZt36TWExuu-lfIJhRuHE-I/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thomas Shaw |
-|Linked videos| https://youtu.be/oi_CfBe_umU; https://youtu.be/Wry2get_RRc|
+|Linked videos| https://youtu.be/oi_CfBe_umU; https://youtu.be/Wry2get_RRc |
|VM names| metactf_desktop; kali |
@@ -2898,10 +3074,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Linux bypassing NX bit with return-to-libc |
-|Description | Similar to last week. Same C code, just compiled w/ stack protections and non-executable stack. [Lab sheet here](https://docs.google.com/document/d/1eUOb1cR-D8qv0NmlGXYUN1JYwmgrwOBNtfsDVdxnPpw/). |
+|Description | Similar to last topic. Same C code, just compiled w/ stack protections and non-executable stack. |
+|Lab sheet | https://docs.google.com/document/d/1eUOb1cR-D8qv0NmlGXYUN1JYwmgrwOBNtfsDVdxnPpw/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thomas Shaw |
-|Linked videos| https://youtu.be/ywLXfSR5YWk|
+|Linked videos| https://youtu.be/ywLXfSR5YWk |
|VM names| metactf_desktop; kali |
@@ -2928,10 +3105,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Linux ASLR bypass |
-|Description | Practical challenges to bypass ASLR, PIE and RelRO. [Lab sheet here](https://docs.google.com/document/d/1NVWjD257EN0pv14G6dD44VpSPYlrR6IC2HPihrsGPnY/). |
+|Description | Practical challenges to bypass ASLR, PIE and RelRO. |
+|Lab sheet | https://docs.google.com/document/d/1NVWjD257EN0pv14G6dD44VpSPYlrR6IC2HPihrsGPnY/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thomas Shaw |
-|Linked videos| https://youtu.be/v2rChKDAmFg; https://youtu.be/xwsBaNQZozg|
+|Linked videos| https://youtu.be/v2rChKDAmFg; https://youtu.be/xwsBaNQZozg |
|VM names| metactf_desktop; kali |
@@ -2958,10 +3136,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Linux Buffer Overflows and Advanced Format String Attacks |
-|Description | [Lab sheet here](https://docs.google.com/document/d/1Ap-h6YSDtfU4bLwiKhxP5x2nf1vjSJ2V2zEL5wzW84U/edit?usp=sharing). |
+|Description | The practical challenges involve exploiting buffer overflow vulnerabilities and a format string vulnerability. |
+|Lab sheet | https://docs.google.com/document/d/1Ap-h6YSDtfU4bLwiKhxP5x2nf1vjSJ2V2zEL5wzW84U/edit?usp=sharing |
|Type | ctf-lab; lab-sheet |
|Author | Thomas Shaw |
-|Linked videos| |
+|Linked videos| |
|VM names| metactf_desktop |
@@ -2987,10 +3166,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Authentication lab |
-|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) Reading[Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)](https://my.leedsbeckett.ac.uk/bbcswebdav/pid-2221598-dt-content-rid-4451698_1/institution/Online%20Learning/AET/CT/MSc%20Computer%20Security/Principles%20of%20Digital%20Security/Readings/Week%205/DCS-85139%20%281%29.pdf) LabA Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) Reading[Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)](https://my.leedsbeckett.ac.uk/bbcswebdav/pid-2221598-dt-content-rid-4451698_1/institution/Online%20Learning/AET/CT/MSc%20Computer%20Security/Principles%20of%20Digital%20Security/Readings/Week%205/DCS-85139%20%281%29.pdf) LabA Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/2I_JSdTu-oI; https://youtu.be/pGcJEML1mRo; https://youtu.be/icC2Zrno_uM; https://youtu.be/Wrg6XZu6Luw|
+|Linked videos| https://youtu.be/2I_JSdTu-oI; https://youtu.be/pGcJEML1mRo; https://youtu.be/icC2Zrno_uM; https://youtu.be/Wrg6XZu6Luw |
|VM names| desktop; server; hackerbot_server; kali_cracker |
@@ -3016,10 +3196,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Pluggable Authentication Modules lab |
-|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) Reading[Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) LabA short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_6/WNS_ADS_Lectures_5_Authentication.html) Reading[Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) LabA short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/z4L6Yv5ry1A; https://youtu.be/-zcnfmoLjYI; https://youtu.be/xHs3LB4Yyrk; https://youtu.be/c2dPdQmaVyo; https://youtu.be/dCBabesIXo8; https://youtu.be/rhdcxhSDqp4; https://youtu.be/PCXK2cK8tpE|
+|Linked videos| https://youtu.be/z4L6Yv5ry1A; https://youtu.be/-zcnfmoLjYI; https://youtu.be/xHs3LB4Yyrk; https://youtu.be/c2dPdQmaVyo; https://youtu.be/dCBabesIXo8; https://youtu.be/rhdcxhSDqp4; https://youtu.be/PCXK2cK8tpE |
|VM names| desktop; server; hackerbot_server |
@@ -3045,10 +3226,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Access Controls lab |
-|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780387277165) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780387277165) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/yWJyZEFbchQ; https://youtu.be/i0kO_3ExJv4|
+|Linked videos| https://youtu.be/yWJyZEFbchQ; https://youtu.be/i0kO_3ExJv4 |
|VM names| shared_desktop; server; hackerbot_server |
@@ -3075,10 +3257,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Set User ID lab |
-|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/abstract/9781449310325) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/viSkkNB777k; https://youtu.be/PGHsb3bg_h4|
+|Linked videos| https://youtu.be/viSkkNB777k; https://youtu.be/PGHsb3bg_h4 |
|VM names| shared_desktop; server; hackerbot_server |
@@ -3104,10 +3287,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Access Control Lists (ACLs) lab |
-|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Grunbacher, Andreas. "POSIX Access Control Lists on Linux." *USENIX Annual Technical Conference*, FREENIX Track. 2003.](https://www.usenix.org/legacy/events/usenix03/tech/freenix03/full_papers/gruenbacher/gruenbacher.pdf) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/1718/ADS_slides_out_week_7/ADS_PDS_Lectures_7_Access_Control.html) Reading[Grunbacher, Andreas. "POSIX Access Control Lists on Linux." *USENIX Annual Technical Conference*, FREENIX Track. 2003.](https://www.usenix.org/legacy/events/usenix03/tech/freenix03/full_papers/gruenbacher/gruenbacher.pdf) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/Bn3NJhgmdLk; https://youtu.be/OT7ifs8PkHI|
+|Linked videos| https://youtu.be/Bn3NJhgmdLk; https://youtu.be/OT7ifs8PkHI |
|VM names| shared_desktop; server; hackerbot_server |
@@ -3133,10 +3317,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Containers lab |
-|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) Reading[Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007](http://z.cliffe.schreuders.org/publications/Computers&Security%20-%20The%20State%20of%20the%20Art%20of%20Application%20Restrictions%20and%20Sandboxes%20-%20Author%20Version.pdf) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) Reading[Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007](http://z.cliffe.schreuders.org/publications/Computers&Security%20-%20The%20State%20of%20the%20Art%20of%20Application%20Restrictions%20and%20Sandboxes%20-%20Author%20Version.pdf) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/f4yBcKkb12g|
+|Linked videos| https://youtu.be/f4yBcKkb12g |
|VM names| desktop; hackerbot_server; chroot_esc_server; docker_esc_server |
@@ -3164,10 +3349,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | AppArmor lab |
-|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) Lectures for the next two weeks[Secure software development](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=31ee4531-1834-4028-8829-aa1d00a73a7e)[Secure design principles](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=6f409b1c-2daa-4798-8bc7-aa2400952d29)[Slides](http://z.cliffe.schreuders.org/presentations/slides/slides_secure_design/ADS_PDS_Lectures_3_Secure_Software_Development_and_Bug_Hunting.html) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Description | Lecture[Slides continued here](http://z.cliffe.schreuders.org/presentations/slides/slides_out_sandboxing/ADS_PDS_Lectures_8_Sandboxes_and_Virtualisation.html) Lectures for the next two weeks[Secure software development](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=31ee4531-1834-4028-8829-aa1d00a73a7e)[Secure design principles](https://leedsbeckettreplay.cloud.panopto.eu/Panopto/Pages/Viewer.aspx?id=6f409b1c-2daa-4798-8bc7-aa2400952d29)[Slides](http://z.cliffe.schreuders.org/presentations/slides/slides_secure_design/ADS_PDS_Lectures_3_Secure_Software_Development_and_Bug_Hunting.html) LabA Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
+|Lab sheet | |
|Type | ctf-lab; hackerbot-lab; lab-sheet |
|Author | Z. Cliffe Schreuders |
-|Linked videos| https://youtu.be/Xgs5akM6ayc|
+|Linked videos| https://youtu.be/Xgs5akM6ayc |
|VM names| desktop; hackerbot_server |
@@ -3194,10 +3380,11 @@ Command to build VMs and start scenario:
| Key | Data |
| --- | --- |
|Name | Web security lab environment |
-|Description | An environment for web security labs. Kali Linux with Damn Vulnerable Web App server, WebGoat, and web sec tools. |
+|Description | An environment for web security labs. Kali Linux with Damn Vulnerable Web App server, WebGoat, and web sec tools. |
+|Lab sheet | |
|Type | lab-environment; ctf-lab |
|Author | Z. Cliffe Schreuders |
-|Linked videos| |
+|Linked videos| |
|VM names| kali |
diff --git a/README.md b/README.md
index 83bee5ebd..d1c1a1ee4 100644
--- a/README.md
+++ b/README.md
@@ -306,6 +306,7 @@ The table below is a key for the abbreviations you will find within the CyBOK XM
| SOIM | Security Operations & Incident Management | [link](https://www.cybok.org/media/downloads/Security_Operations__Incident_Management_issue_1.0.pdf)| [link](https://www.cybok.org/media/downloads/Security_Operations__Incident_Management.pdf)|
| F | Forensics | [link](https://www.cybok.org/media/downloads/Forensics_issue_1.0.pdf)| [link](https://www.cybok.org/media/downloads/Forensics.pdf)|
| C | Cryptography | [link](https://www.cybok.org/media/downloads/Cryptography-issue-1.0.pdf)| [link](https://www.cybok.org/media/downloads/Cryptography.pdf)|
+| AC | Applied Cryptography | [link](https://www.cybok.org/media/downloads/Applied_Cryptography_v1.0.0.pdf)| [link](https://www.cybok.org/media/downloads/Applied_Cryptography_tree-1.0.0.pdf)|
| OSV | Operating Systems & Virtualisation Security | [link](https://www.cybok.org/media/downloads/Operating_Systems__Virtualisation_Security_issue_1.0_xhesi5S.pdf)| [link](https://www.cybok.org/media/downloads/Operating_Systems__Virtualisation_Security.pdf)|
| DSS | Distributed Systems Security | [link](https://www.cybok.org/media/downloads/Distributed_Systems_Security_issue_1.0.pdf)| [link](https://www.cybok.org/media/downloads/Distributed_Systems_Security.pdf)|
| AAA | Authentication, Authorisation and Accountability | [link](https://www.cybok.org/media/downloads/AAA_issue_1.0_q3qspzo.pdf)| [link](https://www.cybok.org/media/downloads/AAA.pdf) |
diff --git a/lib/CyBOK/generate_scenario_index.rb b/lib/CyBOK/generate_scenario_index.rb
index f00a23744..461a6f298 100644
--- a/lib/CyBOK/generate_scenario_index.rb
+++ b/lib/CyBOK/generate_scenario_index.rb
@@ -3,6 +3,7 @@ require 'nori'
require 'youtube_images'
require 'dig-deep'
require 'getoptlong'
+require 'nokogiri/class_resolver'
# if you want to regenerate the indexes you need to install these additional gems:
# gem 'youtube_images'
@@ -79,6 +80,7 @@ VIDEO_HASH = {}
CyBOK_ACRONYMS = {
"AAA" => "Authentication, Authorisation & Accountability",
"AB" => "Adversarial Behaviours",
+ "AC" => "Applied Cryptography",
"C" => "Cryptography",
"CPS" => "Cyber-Physical Systems Security",
"DSS" => "Distributed Systems Security",
diff --git a/lib/CyBOK/template_CyBOK_scenarios.md.erb b/lib/CyBOK/template_CyBOK_scenarios.md.erb
index d254dae05..65b39101b 100644
--- a/lib/CyBOK/template_CyBOK_scenarios.md.erb
+++ b/lib/CyBOK/template_CyBOK_scenarios.md.erb
@@ -54,10 +54,11 @@ SCENARIOS_HASH.keys.each{|scenario|
| Key | Data |
| --- | --- |
|Name | <%= SCENARIOS_FULL_HASH[scenario][0]["name"].to_s %> |
-|Description | <%= SCENARIOS_FULL_HASH[scenario][0]["description"].to_s.delete('#').gsub(/\n/,'') %>|
+|Description | <%= SCENARIOS_FULL_HASH[scenario][0]["description"].to_s.delete('#').gsub(/\n/,'') %> |
+|Lab sheet | <%= SCENARIOS_FULL_HASH[scenario][0]["lab_sheet_url"].to_s.delete('#').gsub(/\n/,'') %> |
|Type | <%= SCENARIOS_FULL_HASH[scenario][0]["type"].to_s.gsub(/"|\[|\]/, '').gsub(',',';') %> |
|Author | <%= SCENARIOS_FULL_HASH[scenario][0]["author"].to_s %> |
-|Linked videos| <%= SCENARIOS_FULL_HASH[scenario][0].dig_deep(:url).to_s.gsub(/"|\[|\]/, '').gsub(',',';') %>|
+|Linked videos| <%= SCENARIOS_FULL_HASH[scenario][0].dig_deep(:url).to_s.gsub(/"|\[|\]/, '').gsub(',',';') %> |
|VM names| <%=
systems = SCENARIOS_FULL_HASH[scenario][0].dig_deep(:system_name).to_s.gsub(/"|\[|\]/, '').gsub(',',';') %> |
diff --git a/lib/CyBOK/validate_xml_all_modules.rb b/lib/CyBOK/validate_xml_all_modules.rb
index 0147050a9..515d60f83 100644
--- a/lib/CyBOK/validate_xml_all_modules.rb
+++ b/lib/CyBOK/validate_xml_all_modules.rb
@@ -1,3 +1,4 @@
+require 'nokogiri/class_resolver'
require 'nokogiri'
require_relative '../helpers/print.rb'
diff --git a/lib/CyBOK/validate_xml_all_scenarios.rb b/lib/CyBOK/validate_xml_all_scenarios.rb
index 97d6bbdf7..2a3dee0ca 100644
--- a/lib/CyBOK/validate_xml_all_scenarios.rb
+++ b/lib/CyBOK/validate_xml_all_scenarios.rb
@@ -1,3 +1,4 @@
+require 'nokogiri/class_resolver'
require 'nokogiri'
require_relative '../helpers/print.rb'
diff --git a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
index 8b8b0e8df..6cb28c5e8 100644
--- a/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
+++ b/scenarios/labs/cyber_security_landscape/4_encoding_encryption.xml
@@ -21,7 +21,10 @@
Vigenere cipher
SYMMETRIC CRYPTOGRAPHY - AES (ADVANCED ENCRYPTION STANDARD)
-
+
+ Encoding and alternative data formats
+
+
desktop