128 KiB
SecGen Lab Scenarios and CyBOK
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
This file is an autogenerated index and cross referencing of the 91 SecGen scenarios that have CyBOK metadata (mostly practical labs) .
You can browse the list below in terms of the CyBOK Knowledge Areas, and Topics. The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).
The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the CyBOK mapping reference, mixed case keywords are ones that we have added.
Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
Scenarios Indexed By CyBOK Knowledge Area (KA)
Authentication, Authorisation & Accountability (AAA)
AAA Scenarios
labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/macs-hash.xml
labs/labtainers/nix-commands.xml
labs/labtainers/onewayhash.xml
labs/labtainers/radius.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml
AAA Scenarios by Topics
(OSVS)
OSVS Scenarios
labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/capabilities.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/7_live_analysis.xml
OSVS Scenarios by Topics
(WMS)
WMS Scenarios
labs/authentication_and_access_controls/ads_6_containers.xml
labs/labtainers/sql-inject.xml
labs/web_security/websec_lab.xml
WMS Scenarios by Topics
| Topic | Scenario |
|---|---|
| Fundamental Concepts and Approaches | labs/authentication_and_access_controls/ads_6_containers.xml labs/web_security/websec_lab.xml |
| Server-Side Vulnerabilities and Mitigations | labs/labtainers/sql-inject.xml labs/web_security/websec_lab.xml |
| Client-Side Vulnerabilities and Mitigations | labs/web_security/websec_lab.xml |
Software Security (SS)
SS Scenarios
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/introducing_attacks/6_exploitation.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/pass-crack.xml
labs/labtainers/retlibc.xml
labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
labs/web_security/websec_lab.xml
SS Scenarios by Topics
Network Security (NS)
NS Scenarios
labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/denyhost.xml
labs/labtainers/dmz-example.xml
labs/labtainers/dmz-lab.xml
labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/local-dns.xml
labs/labtainers/nix-commands.xml
labs/labtainers/nmap-discovery.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/pubkey.xml
labs/labtainers/radius.xml
labs/labtainers/remote-dns.xml
labs/labtainers/routing-basics.xml
labs/labtainers/routing-basics2.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml
NS Scenarios by Topics
Security Operations & Incident Management (SOIM)
SOIM Scenarios
labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/backups.xml
labs/labtainers/backups2.xml
labs/labtainers/capabilities.xml
labs/labtainers/centos-log.xml
labs/labtainers/centos-log2.xml
labs/labtainers/cyberciege.xml
labs/labtainers/denyhost.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/metasploit.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/snort.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/3_backups_and_recovery.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml
SOIM Scenarios by Topics
Malware & Attack Technology (MAT)
MAT Scenarios
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/gdblesson.xml
labs/labtainers/ida.xml
labs/labtainers/metasploit.xml
labs/labtainers/retlibc.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/3_c_and_asm.xml
labs/software_and_malware_analysis/4_asm.xml
labs/software_and_malware_analysis/5_ghidra.xml
labs/software_and_malware_analysis/6_ghidra_analysis.xml
labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
labs/software_and_malware_analysis/7_dynamic.xml
labs/software_and_malware_analysis/8_anti_sre.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
MAT Scenarios by Topics
Forensics (F)
F Scenarios
labs/labtainers/file-deletion.xml
labs/labtainers/file-integrity.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pass-crack.xml
labs/labtainers/pcapanalysis.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/6_exfiltration_detection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml
F Scenarios by Topics
Cyber-Physical Systems Security (CPS)
CPS Scenarios
labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml
CPS Scenarios by Topics
Web & Mobile Security (WAM)
WAM Scenarios
labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
WAM Scenarios by Topics
| Topic | Scenario |
|---|---|
| FIREWALLS | labs/labtainers/iptables-ics.xml labs/labtainers/iptables.xml labs/labtainers/iptables2.xml |
Cryptography (C)
C Scenarios
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/pubkey.xml
labs/labtainers/ssh-agent.xml
labs/labtainers/sshlab.xml
labs/labtainers/ssl.xml
C Scenarios by Topics
| Topic | Scenario |
|---|---|
| Public-Key Cryptography | labs/labtainers/macs-hash.xml labs/labtainers/onewayhash.xml labs/labtainers/ssh-agent.xml labs/labtainers/sshlab.xml labs/labtainers/ssl.xml |
| Schemes | labs/labtainers/pubkey.xml |
Human Factors (HF)
HF Scenarios
HF Scenarios by Topics
| Topic | Scenario |
|---|---|
| Fitting the Task to the Human | labs/labtainers/ssl.xml |
Scenario CyBOK Keywords
labs/authentication_and_access_controls/ads_1_authentication.xml
Details
| Key | Data |
|---|---|
| Name | Authentication lab |
| Description | Lecture Slides here Reading Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) Lab A Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/2I_JSdTu-oI; https://youtu.be/pGcJEML1mRo; https://youtu.be/icC2Zrno_uM; https://youtu.be/Wrg6XZu6Luw |
| VM names | desktop; server; hackerbot_server; kali_cracker |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_1_authentication.xml run
labs/authentication_and_access_controls/ads_2_pam.xml
Details
| Key | Data |
|---|---|
| Name | Pluggable Authentication Modules lab |
| Description | Lecture Watch authentication part 3 Slides continued here Reading Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Lab A short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/z4L6Yv5ry1A; https://youtu.be/-zcnfmoLjYI; https://youtu.be/xHs3LB4Yyrk; https://youtu.be/c2dPdQmaVyo; https://youtu.be/dCBabesIXo8; https://youtu.be/rhdcxhSDqp4; https://youtu.be/PCXK2cK8tpE |
| VM names | desktop; server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_2_pam.xml run
labs/authentication_and_access_controls/ads_3_access_controls.xml
Details
| Key | Data |
|---|---|
| Name | Access Controls lab |
| Description | Lecture Watch access controls part 1 Slides here Reading Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459) Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/yWJyZEFbchQ; https://youtu.be/i0kO_3ExJv4 |
| VM names | shared_desktop; server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_3_access_controls.xml run
labs/authentication_and_access_controls/ads_4_suid.xml
Details
| Key | Data |
|---|---|
| Name | Set User ID lab |
| Description | Lecture Watch access controls part 2 Slides continued here Reading Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/viSkkNB777k; https://youtu.be/PGHsb3bg_h4 |
| VM names | shared_desktop; server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_4_suid.xml run
labs/authentication_and_access_controls/ads_5_facls.xml
Details
| Key | Data |
|---|---|
| Name | Access Control Lists (ACLs) lab |
| Description | Lecture Watch access controls part 3 Slides continued here Reading Grunbacher, Andreas. "POSIX Access Control Lists on Linux." USENIX Annual Technical Conference, FREENIX Track. 2003. Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/Bn3NJhgmdLk; https://youtu.be/OT7ifs8PkHI |
| VM names | shared_desktop; server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_5_facls.xml run
labs/authentication_and_access_controls/ads_6_containers.xml
Details
| Key | Data |
|---|---|
| Name | Containers lab |
| Description | Lecture Sandboxing Slides here Reading Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007 Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/f4yBcKkb12g |
| VM names | desktop; hackerbot_server; chroot_esc_server; docker_esc_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_6_containers.xml run
labs/authentication_and_access_controls/ads_7_apparmor.xml
Details
| Key | Data |
|---|---|
| Name | AppArmor lab |
| Description | Lecture Rule-based sandboxes Mobile device sandboxes Slides continued here Lectures for the next two weeks Secure software development Secure design principles Slides Lab A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | https://youtu.be/Xgs5akM6ayc |
| VM names | desktop; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes |
Command to start scenario:
ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_7_apparmor.xml run
labs/introducing_attacks/1_intro_linux.xml
Details
| Key | Data |
|---|---|
| Name | Introduction to Linux and Security lab |
| Description | Introduction This topic covers lots of ground regarding fundamentals of Linux and free open source software (FOSS). Lecture Slides here Reading Chapters 1 "Introduction" and 2 "Unix History and Lineage": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Suggested: Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Protocols and Vulnerability | common network attacks |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/1_intro_linux.xml run
labs/introducing_attacks/2_malware_msf_payloads.xml
Details
| Key | Data |
|---|---|
| Name | Malware and an Introduction to Metasploit and Payloads |
| Description | Introduction This week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program. Lecture Slides here Reading Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library Suggested: Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779) Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442) Lab Lab sheet here. |
| Type | lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_victim; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/2_malware_msf_payloads.xml run
labs/introducing_attacks/3_vulnerabilities.xml
Details
| Key | Data |
|---|---|
| Name | Vulnerabilities, Exploits, and Remote Access Payloads |
| Description | Introduction This week we will cover one of the major threats in computer security: software vulnerabilities. You will learn about the danger these pose, and start to learn about the power of the Metasploit framework, a popular hacking and penetration testing tool. You will learn and apply a number of important concepts such as payloads, shell code, bind and reverse shells, and both remote and local (client-side) exploits. Lecture Slides here Reading Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_victim; linux_victim_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION; EXPLOITATION FRAMEWORKS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/3_vulnerabilities.xml run
labs/introducing_attacks/4_dns_footprinting.xml
Details
| Key | Data |
|---|---|
| Name | Information Gathering: Footprinting |
| Description | Introduction The topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to). Lecture Slides here Reading Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library Lab Lab sheet here. |
| Type | lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | PENETRATION TESTING | PENETRATION TESTING - DNS ZONE TRANSFER; EXPLOITATION FRAMEWORKS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/4_dns_footprinting.xml run
labs/introducing_attacks/5_scanning.xml
Details
| Key | Data |
|---|---|
| Name | Information Gathering: Scanning |
| Description | Introduction This week we learn how to scan networks to get an understanding of and to map out a network. Scanning is a critical stage for an attacker, since it can give them the information they need in order to launch an attack. Reading Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | linux_victim_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malicious Activities by Malware | cyber kill chain |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/5_scanning.xml run
labs/introducing_attacks/6_exploitation.xml
Details
| Key | Data |
|---|---|
| Name | From Scanning to Exploitation |
| Description | Introduction This week we learn how we can scan networks to discover vulnerable services, and exploit them. Reading Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_server; linux_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malicious Activities by Malware | cyber kill chain |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/6_exploitation.xml run
labs/introducing_attacks/7_post-exploitation.xml
Details
| Key | Data |
|---|---|
| Name | Post-exploitation |
| Description | Introduction Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an expliot has been successful. Suggested reading An excellent resource is Metaploit Unleashed. Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_server; linux_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malicious Activities by Malware | cyber kill chain; attack on confidentiality; integrity; availability |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/7_post-exploitation.xml run
labs/introducing_attacks/8_vulnerability_analysis.xml
Details
| Key | Data |
|---|---|
| Name | Vulnerability Analysis |
| Description | Introduction It is important for organisations to manage the security of their systems and for security professionals to efficiently scan networks for vulnerabilities. Lab Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | linux_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | PENETRATION TESTING | VULNERABILITY ANALYSIS / VULNERABILITY SCANNING; AUDIT APPROACH; PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION |
Command to start scenario:
ruby secgen.rb -s scenario/labs/introducing_attacks/8_vulnerability_analysis.xml run
labs/labtainers/acl-hackerbot-flags.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: acl |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/acl-hackerbot-flags.xml run
labs/labtainers/acl.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: acl |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/acl.xml run
labs/labtainers/arp-spoof.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: arp-spoof |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Protocols and Vulnerability | ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; MITM (MAN-IN-THE-MIDDLE ATTACK); MAN-IN-THE-MIDDLE ATTACK (MITM); ATTACK(S) - ARP |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/arp-spoof.xml run
labs/labtainers/backups.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: backups |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/backups.xml run
labs/labtainers/backups2.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: backups2 |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/backups2.xml run
labs/labtainers/bufoverflow.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: bufoverflow |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/bufoverflow.xml run
labs/labtainers/capabilities.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: capabilities |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| (OSVS) | Primitives for Isolation and Mediation | capabilities; Rule-based controls: Course grained: Linux capabilities |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/capabilities.xml run
labs/labtainers/centos-log.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: centos-log |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | application logs: web server logs and files; system and kernel logs; Syslog |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/centos-log.xml run
labs/labtainers/centos-log2.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: centos-log2 |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | application logs: web server logs and files; system and kernel logs; Syslog |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/centos-log2.xml run
labs/labtainers/cyberciege.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: cyberciege |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | application logs: web server logs and files; system and kernel logs; Syslog |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/cyberciege.xml run
labs/labtainers/denyhost.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: denyhost |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Defence Tools | packet filters; intrusion detection systems; intrusion prevention systems |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/denyhost.xml run
labs/labtainers/dmz-example.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: dmz-example |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Defence Tools | DEMILITARISED ZONE (DMZ) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/dmz-example.xml run
labs/labtainers/dmz-lab.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: dmz-lab |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Defence Tools | DEMILITARISED ZONE (DMZ) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/dmz-lab.xml run
labs/labtainers/file-deletion.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: file-deletion |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Operating System Analysis | storage forensics; data recovery and file content carving |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/file-deletion.xml run
labs/labtainers/file-integrity.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: file-integrity |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | access control; Protecting integrity |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/file-integrity.xml run
labs/labtainers/formatstring.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: formatstring |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION; Exploit development; Mitigation bypass: ASLR |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/formatstring.xml run
labs/labtainers/gdblesson.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: gdblesson |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/gdblesson.xml run
labs/labtainers/ida.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: ida |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/ida.xml run
labs/labtainers/iptables-ics.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: iptables-ics |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems Domains | industrial control systems |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/iptables-ics.xml run
labs/labtainers/iptables.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: iptables |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Defence Tools | FIREWALLS; IPTables |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/iptables.xml run
labs/labtainers/iptables2.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: iptables2 |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Defence Tools | FIREWALLS; IPTables |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/iptables2.xml run
labs/labtainers/ldap.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: ldap |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; authentication in distributed systems |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/ldap.xml run
labs/labtainers/local-dns.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: local-dns |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Protocols and Vulnerability | ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/local-dns.xml run
labs/labtainers/macs-hash.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: macs-hash |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/macs-hash.xml run
labs/labtainers/metasploit.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: metasploit |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malicious Activities by Malware | cyber kill chain |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/metasploit.xml run
labs/labtainers/nix-commands.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: nix-commands |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/nix-commands.xml run
labs/labtainers/nmap-discovery.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: nmap-discovery |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | PENETRATION TESTING | PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/nmap-discovery.xml run
labs/labtainers/nmap-ssh.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: nmap-ssh |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | PENETRATION TESTING | PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/nmap-ssh.xml run
labs/labtainers/onewayhash.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: onewayhash |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/onewayhash.xml run
labs/labtainers/packet-introspection.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: packet-introspection |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Main Memory Forensics | network connections; data recovery and file content carving |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/packet-introspection.xml run
labs/labtainers/pass-crack.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: pass-crack |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Artifact Analysis | cryptographic hashing |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/pass-crack.xml run
labs/labtainers/pcapanalysis.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: pcapanalysis |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Main Memory Forensics | network connections |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/pcapanalysis.xml run
labs/labtainers/plc-app.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: plc-app |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/plc-app.xml run
labs/labtainers/plc-forensics-adv.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: plc-forensics-adv |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/plc-forensics-adv.xml run
labs/labtainers/plc-forensics.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: plc-forensics |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/plc-forensics.xml run
labs/labtainers/plc.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: plc |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/plc.xml run
labs/labtainers/pubkey.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: pubkey |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cryptography (C) | Schemes | TLS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/pubkey.xml run
labs/labtainers/radius.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: radius |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; authentication in distributed systems |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/radius.xml run
labs/labtainers/remote-dns.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: remote-dns |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Network Protocols and Vulnerability | ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/remote-dns.xml run
labs/labtainers/retlibc.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: retlibc |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/retlibc.xml run
labs/labtainers/routing-basics.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: routing-basics |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Internet Architecture | network layer security |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/routing-basics.xml run
labs/labtainers/routing-basics2.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: routing-basics2 |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Network Security (NS) | Internet Architecture | network layer security |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/routing-basics2.xml run
labs/labtainers/setuid-env.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: setuid-env |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/setuid-env.xml run
labs/labtainers/snort.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: snort |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/snort.xml run
labs/labtainers/softplc.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: softplc |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/softplc.xml run
labs/labtainers/softplc2.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: softplc2 |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cyber-Physical Systems Security (CPS) | Cyber-Physical Systems | characteristics; security and privacy concerns |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/softplc2.xml run
labs/labtainers/sql-inject.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: sql-inject |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | Web vulnerabilities / OWASP Top 10; API vulnerabilities |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/sql-inject.xml run
labs/labtainers/ssh-agent.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: ssh-agent |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cryptography (C) | Public-Key Cryptography | public-key encryption; public-key signatures |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/ssh-agent.xml run
labs/labtainers/sshlab.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: sshlab |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cryptography (C) | Public-Key Cryptography | public-key encryption; public-key signatures |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/sshlab.xml run
labs/labtainers/ssl.xml
Details
| Key | Data |
|---|---|
| Name | Labtainers lab: ssl |
| Description | A Labtainers lab. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Cryptography (C) | Public-Key Cryptography | public-key encryption; public-key signatures |
Command to start scenario:
ruby secgen.rb -s scenario/labs/labtainers/ssl.xml run
labs/response_and_investigation/1_integrity_protection.xml
Details
| Key | Data |
|---|---|
| Name | Integrity protection lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Protecting integrity with file attributes; Protecting integrity with read-only filesystems. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Protecting integrity |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/1_integrity_protection.xml run
labs/response_and_investigation/2_integrity_detection.xml
Details
| Key | Data |
|---|---|
| Name | Integrity detection lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Detecting changes to resources using backups; File integrity checkers; Detecting changes to resources using package management. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Artifact Analysis | cryptographic hashing |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/2_integrity_detection.xml run
labs/response_and_investigation/3_backups_and_recovery.xml
Details
| Key | Data |
|---|---|
| Name | Backups lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Rsync, and backups and restoring data using differential and incremental backups. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; backup_server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/3_backups_and_recovery.xml run
labs/response_and_investigation/4_ids.xml
Details
| Key | Data |
|---|---|
| Name | IDS lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; ids_snoop; web_server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/4_ids.xml run
labs/response_and_investigation/5_ids_rules.xml
Details
| Key | Data |
|---|---|
| Name | IDS rules lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; ids_snoop; web_server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/5_ids_rules.xml run
labs/response_and_investigation/6_exfiltration_detection.xml
Details
| Key | Data |
|---|---|
| Name | Exfiltration detection lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; ids_snoop; web_server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Artifact Analysis | cryptographic hashing |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/6_exfiltration_detection.xml run
labs/response_and_investigation/7_live_analysis.xml
Details
| Key | Data |
|---|---|
| Name | Live analysis lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; compromised_server; hackerbot_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/7_live_analysis.xml run
labs/response_and_investigation/8_dead_analysis.xml
Details
| Key | Data |
|---|---|
| Name | Dead analysis lab |
| Description | A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. |
| Type | ctf-lab; hackerbot-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop; hackerbot_server; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Forensics (F) | Operating System Analysis | storage forensics; data recovery and file content carving; Timeline analysis |
Command to start scenario:
ruby secgen.rb -s scenario/labs/response_and_investigation/8_dead_analysis.xml run
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
Details
| Key | Data |
|---|---|
| Name | Introdution to Malware analysis lab |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml run
labs/software_and_malware_analysis/3_c_and_asm.xml
Details
| Key | Data |
|---|---|
| Name | C and Assembly lab |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. This week, we will finish our crash course in C programming by looking at structs, a data type used to represent composite data, memory management, one of the biggest strengths of the C language, and bitwise operators, which you will find particularly helpful when looking at disassembled code. We will then change our focus to assembly language. Starting with some basics, we will familiarise ourselves with the syntax and organisation of decompiled code before moving onto recognising the structures we learned last week in the assembly code. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thalita Vergilio |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/3_c_and_asm.xml run
labs/software_and_malware_analysis/4_asm.xml
Details
| Key | Data |
|---|---|
| Name | Recognising C Code Constructs in Assembly lab |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. We start with understanding how branching and conditionals are represented in assembly. We then move onto learning how to identify the common C code constructs we saw in previous weeks in disassembled code, namely loops, function calls, switch statements, arrays and structs. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thalita Vergilio |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/4_asm.xml run
labs/software_and_malware_analysis/5_ghidra.xml
Details
| Key | Data |
|---|---|
| Name | Ghidra lab |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/5_ghidra.xml run
labs/software_and_malware_analysis/6_ghidra_analysis.xml
Details
| Key | Data |
|---|---|
| Name | Ghidra lab analysis |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. There are two binaries to practice SRE with Ghidra. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/6_ghidra_analysis.xml run
labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
Details
| Key | Data |
|---|---|
| Name | Ghidra lab with LIVE MALWARE SAMPLES |
| Description | You will find live malware samples in /opt/theZoo. |
| Type | lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml run
labs/software_and_malware_analysis/7_dynamic.xml
Details
| Key | Data |
|---|---|
| Name | Dynamic analysis SRE |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/7_dynamic.xml run
labs/software_and_malware_analysis/8_anti_sre.xml
Details
| Key | Data |
|---|---|
| Name | Anti-SRE |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; anti-analysis and evasion techniques |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/8_anti_sre.xml run
labs/software_and_malware_analysis/9_malware_behaviour.xml
Details
| Key | Data |
|---|---|
| Name | Malware Behaviour |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. There are binaries to perform dynamic SRE. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | metactf |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_and_malware_analysis/9_malware_behaviour.xml run
labs/software_security_exploitation/1_c_asm_iof.xml
Details
| Key | Data |
|---|---|
| Name | Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | Integer overflow |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/1_c_asm_iof.xml run
labs/software_security_exploitation/2_race_conditions_format_str.xml
Details
| Key | Data |
|---|---|
| Name | Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks |
| Description | A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | race condition vulnerabilities; structured output generation vulnerabilities; Format string attacks |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/2_race_conditions_format_str.xml run
labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
Details
| Key | Data |
|---|---|
| Name | Bug Hunting and Fuzzing |
| Description | Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_victim; kali; desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Detection of Vulnerabilities | dynamic detection |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml run
labs/software_security_exploitation/4_exploit_development.xml
Details
| Key | Data |
|---|---|
| Name | Exploit Development |
| Description | Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | windows_victim; kali; windows_victim_server |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/4_exploit_development.xml run
labs/software_security_exploitation/5_linux_bof_format.xml
Details
| Key | Data |
|---|---|
| Name | Linux Buffer Overflows and Advanced Format String Attacks |
| Description | Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thomas Shaw |
| Linked videos | |
| VM names | metactf_desktop |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows; Format string attacks |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/5_linux_bof_format.xml run
labs/software_security_exploitation/6_linux_stack_bof.xml
Details
| Key | Data |
|---|---|
| Name | Writing Exploits: Linux and Stack-smashing Buffer Overflows |
| Description | Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thomas Shaw |
| Linked videos | |
| VM names | metactf_desktop; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/6_linux_stack_bof.xml run
labs/software_security_exploitation/7_linux_nx_bypass.xml
Details
| Key | Data |
|---|---|
| Name | Linux bypassing NX bit with return-to-libc |
| Description | Similar to last week. Same C code, just compiled w/ stack protections and non-executable stack. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thomas Shaw |
| Linked videos | |
| VM names | metactf_desktop; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/7_linux_nx_bypass.xml run
labs/software_security_exploitation/8_linux_aslr_bypass.xml
Details
| Key | Data |
|---|---|
| Name | Linux ASLR bypass |
| Description | Practical challenges to bypass ASLR, PIE and RelRO. Lab sheet here. |
| Type | ctf-lab; lab-sheet |
| Author | Thomas Shaw |
| Linked videos | |
| VM names | metactf_desktop; kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities; Stack smashing buffer overflows |
Command to start scenario:
ruby secgen.rb -s scenario/labs/software_security_exploitation/8_linux_aslr_bypass.xml run
labs/web_security/websec_lab.xml
Details
| Key | Data |
|---|---|
| Name | Web security lab environment |
| Description | An environment for web security labs. Kali Linux with Damn Vulnerable Web App server, WebGoat, and web sec tools. |
| Type | lab-environment; ctf-lab |
| Author | Z. Cliffe Schreuders |
| Linked videos | |
| VM names | kali |
CyBOK KAs, Topics, and Keywords
| KA | Topic | Keywords |
|---|---|---|
| (WMS) | Fundamental Concepts and Approaches | web PKI and HTTPS; authentication; cookies; passwords and alternatives; JAVASCRIPT / HYPERTEXT MARKUP LANGUAGE (HTML) / CASCADING STYLE SHEETS (CSS) / HYPERTEXT TRANSFER PROTOCOL (HTTP)\n\t\tCOOKIES; HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING; Broken Access Control / Insecure Direct Object References; SESSION HIJACKING; REPRESENTATIONAL STATE TRANSFER (REST) |
Command to start scenario:
ruby secgen.rb -s scenario/labs/web_security/websec_lab.xml run