mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-20 13:50:45 +00:00
Update lab sheet URLs in introducing_attacks scenarios
Replaced Google Docs links with new URLs pointing to HacktivityLabSheets for the following scenarios: 1. 1_intro_linux.xml 2. 2_malware_msf_payloads.xml 3. 3_vulnerabilities.xml 4. 5_scanning.xml 5. 6_exploitation.xml 6. 7_post-exploitation.xml 7. 8_vulnerability_analysis.xml
This commit is contained in:
@@ -22,7 +22,7 @@ Suggested:
|
||||
|
||||
Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1vA_Ev_GPqPg3cGZblgVclWmTU-sUEEBqwYpFH09mQjg/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/1-intro-linux/</lab_sheet_url>
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>easy</difficulty>
|
||||
|
||||
@@ -25,7 +25,7 @@ Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security
|
||||
|
||||
Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/2-malware-msf-payloads/</lab_sheet_url>
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>easy</difficulty>
|
||||
|
||||
|
||||
@@ -18,7 +18,7 @@ Throughout this lab, you will gain a deeper understanding of software vulnerabil
|
||||
# Reading
|
||||
[Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library](https://www-dawsonera-com.ezproxy.leedsbeckett.ac.uk/readonline/9780071742566)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/11I8xMUXrT5ArJIsAhwGDtQ4RkH4l9CR4C2wh9_wz8xM/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/3-vulnerabilities/</lab_sheet_url>
|
||||
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
|
||||
@@ -15,7 +15,7 @@ This lab provides an in-depth exploration of scanning techniques. You will learn
|
||||
# Reading
|
||||
[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1KScKw7M4Bt_FE5F_2tI6tnK1NrKNAJkyh5F2TpOh9hA/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/5-scanning/</lab_sheet_url>
|
||||
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
|
||||
@@ -15,7 +15,7 @@ In this lab, you will learn how to scan a network for vulnerable servers, use Me
|
||||
# Reading
|
||||
[Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library](http://www.sciencedirect.com/science/book/9781597496551)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1puLuKwqiFMTAZhMKKLhS_aK7kKwWnKw1e3StJBiFmFA/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/6-exploitation/</lab_sheet_url>
|
||||
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
|
||||
@@ -15,7 +15,7 @@ You will learn the skills used by an attacker or security tester, to take action
|
||||
# Suggested reading
|
||||
[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/7-post-exploitation/</lab_sheet_url>
|
||||
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
|
||||
@@ -13,7 +13,7 @@ It is important for organisations to manage the security of their systems and fo
|
||||
Throughout this lab, you will learn how to use Nmap and its Nmap scripting engine (NSE) to perform vulnerability scanning, discover potential weaknesses in a target system, and gain insights into the ethical hacking and penetration testing process. You will also explore Nessus, a commercial vulnerability scanner, and understand how it operates, what vulnerabilities it can identify, and how to interpret the results. Additionally, you will utilize Nikto, a web vulnerability scanner, to assess the security of web servers, identifying critical vulnerabilities. By completing tasks like initiating scans, analyzing results, and considering the limitations of automated tools, you will gain a practical understanding of vulnerability assessment and the role it plays in strengthening cybersecurity.
|
||||
|
||||
</description>
|
||||
<lab_sheet_url>https://docs.google.com/document/d/1rdNcOmYOjsRu97Gh3ds8HbTpORGxbMcd2Q7U4TATIbw/edit?usp=sharing</lab_sheet_url>
|
||||
<lab_sheet_url>https://cliffe.github.io/HacktivityLabSheets/labs/introducing_attacks/8-vulnerability-analysis/</lab_sheet_url>
|
||||
|
||||
<type>ctf-lab</type>
|
||||
<type>lab-sheet</type>
|
||||
|
||||
Reference in New Issue
Block a user