Files
SecGen/README-CyBOK-Scenarios-Indexed.md
Z. Cliffe Schreuders 878ebf9c92 CyBOK
2021-04-27 01:29:35 +01:00

128 KiB

SecGen Lab Scenarios and CyBOK

The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.

This file is an autogenerated index and cross referencing of the 91 SecGen scenarios that have CyBOK metadata (mostly practical labs) .

You can browse the list below in terms of the CyBOK Knowledge Areas, and Topics. The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).

The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the CyBOK mapping reference, mixed case keywords are ones that we have added.

Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.

Scenarios Indexed By CyBOK Knowledge Area (KA)

Authentication, Authorisation & Accountability (AAA)

AAA Scenarios

labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/macs-hash.xml
labs/labtainers/nix-commands.xml
labs/labtainers/onewayhash.xml
labs/labtainers/radius.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml

AAA Scenarios by Topics

Topic Scenario
Authentication labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/radius.xml
Authorisation labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/ldap.xml
labs/labtainers/nix-commands.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
Accountability labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml

(OSVS)

OSVS Scenarios

labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/capabilities.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/7_live_analysis.xml

OSVS Scenarios by Topics

Topic Scenario
Primitives for Isolation and Mediation labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/capabilities.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
Role of Operating Systems labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
OS Hardening labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/7_live_analysis.xml

(WMS)

WMS Scenarios

labs/authentication_and_access_controls/ads_6_containers.xml
labs/labtainers/sql-inject.xml
labs/web_security/websec_lab.xml

WMS Scenarios by Topics

Topic Scenario
Fundamental Concepts and Approaches labs/authentication_and_access_controls/ads_6_containers.xml
labs/web_security/websec_lab.xml
Server-Side Vulnerabilities and Mitigations labs/labtainers/sql-inject.xml
labs/web_security/websec_lab.xml
Client-Side Vulnerabilities and Mitigations labs/web_security/websec_lab.xml

Software Security (SS)

SS Scenarios

labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/introducing_attacks/6_exploitation.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/pass-crack.xml
labs/labtainers/retlibc.xml
labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
labs/web_security/websec_lab.xml

SS Scenarios by Topics

Topic Scenario
Mitigating Exploitation labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/retlibc.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
Categories of Vulnerabilities labs/introducing_attacks/6_exploitation.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/retlibc.xml
labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
labs/web_security/websec_lab.xml
Authentication labs/labtainers/pass-crack.xml
Prevention of Vulnerabilities labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/web_security/websec_lab.xml
Detection of Vulnerabilities labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml

Network Security (NS)

NS Scenarios

labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/denyhost.xml
labs/labtainers/dmz-example.xml
labs/labtainers/dmz-lab.xml
labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/local-dns.xml
labs/labtainers/nix-commands.xml
labs/labtainers/nmap-discovery.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/pubkey.xml
labs/labtainers/radius.xml
labs/labtainers/remote-dns.xml
labs/labtainers/routing-basics.xml
labs/labtainers/routing-basics2.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml

NS Scenarios by Topics

Topic Scenario
Network Protocols and Vulnerability labs/introducing_attacks/1_intro_linux.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/local-dns.xml
labs/labtainers/remote-dns.xml
PENETRATION TESTING labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/labtainers/nix-commands.xml
labs/labtainers/nmap-discovery.xml
labs/labtainers/nmap-ssh.xml
Network Defence Tools labs/labtainers/denyhost.xml
labs/labtainers/dmz-example.xml
labs/labtainers/dmz-lab.xml
labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml
Internet Architecture labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/pubkey.xml
labs/labtainers/radius.xml
labs/labtainers/routing-basics.xml
labs/labtainers/routing-basics2.xml
OSI (OPEN SYSTEM INTERCONNECT) MODEL labs/labtainers/pcapanalysis.xml

Security Operations & Incident Management (SOIM)

SOIM Scenarios

labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/backups.xml
labs/labtainers/backups2.xml
labs/labtainers/capabilities.xml
labs/labtainers/centos-log.xml
labs/labtainers/centos-log2.xml
labs/labtainers/cyberciege.xml
labs/labtainers/denyhost.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/metasploit.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/snort.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/3_backups_and_recovery.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml

SOIM Scenarios by Topics

Topic Scenario
PENETRATION TESTING labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/metasploit.xml
Monitor: Data Sources labs/labtainers/arp-spoof.xml
labs/labtainers/capabilities.xml
labs/labtainers/centos-log.xml
labs/labtainers/centos-log2.xml
labs/labtainers/cyberciege.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/snort.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml
Execute: Mitigation and Countermeasures labs/labtainers/backups.xml
labs/labtainers/backups2.xml
labs/labtainers/denyhost.xml
labs/labtainers/snort.xml
labs/response_and_investigation/3_backups_and_recovery.xml
labs/response_and_investigation/4_ids.xml
INCIDENT RESPONSE labs/labtainers/backups.xml
labs/labtainers/backups2.xml
CM (CONFIGURATION MANAGEMENT) labs/labtainers/denyhost.xml
labs/labtainers/nmap-ssh.xml
Analyse: Analysis Methods labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml

Malware & Attack Technology (MAT)

MAT Scenarios

labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/gdblesson.xml
labs/labtainers/ida.xml
labs/labtainers/metasploit.xml
labs/labtainers/retlibc.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/3_c_and_asm.xml
labs/software_and_malware_analysis/4_asm.xml
labs/software_and_malware_analysis/5_ghidra.xml
labs/software_and_malware_analysis/6_ghidra_analysis.xml
labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
labs/software_and_malware_analysis/7_dynamic.xml
labs/software_and_malware_analysis/8_anti_sre.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml

MAT Scenarios by Topics

Topic Scenario
Malware Taxonomy labs/introducing_attacks/2_malware_msf_payloads.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml
Malware Analysis labs/introducing_attacks/2_malware_msf_payloads.xml
labs/labtainers/gdblesson.xml
labs/labtainers/ida.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/3_c_and_asm.xml
labs/software_and_malware_analysis/4_asm.xml
labs/software_and_malware_analysis/5_ghidra.xml
labs/software_and_malware_analysis/6_ghidra_analysis.xml
labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
labs/software_and_malware_analysis/7_dynamic.xml
labs/software_and_malware_analysis/8_anti_sre.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml
Attacks and exploitation labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/metasploit.xml
labs/labtainers/retlibc.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
Malicious Activities by Malware labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/labtainers/metasploit.xml
MALCODE/MALWARE labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
Malware Detection labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml

Forensics (F)

F Scenarios

labs/labtainers/file-deletion.xml
labs/labtainers/file-integrity.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pass-crack.xml
labs/labtainers/pcapanalysis.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/6_exfiltration_detection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml

F Scenarios by Topics

Topic Scenario
Operating System Analysis labs/labtainers/file-deletion.xml
labs/labtainers/file-integrity.xml
labs/response_and_investigation/8_dead_analysis.xml
Artifact Analysis labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/pass-crack.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/6_exfiltration_detection.xml
Main Memory Forensics labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/response_and_investigation/7_live_analysis.xml

Cyber-Physical Systems Security (CPS)

CPS Scenarios

labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml

CPS Scenarios by Topics

Topic Scenario
Cyber-Physical Systems Domains labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml
Cyber-Physical Systems labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml

Web & Mobile Security (WAM)

WAM Scenarios

labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml

WAM Scenarios by Topics

Topic Scenario
FIREWALLS labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml

Cryptography (C)

C Scenarios

labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/pubkey.xml
labs/labtainers/ssh-agent.xml
labs/labtainers/sshlab.xml
labs/labtainers/ssl.xml

C Scenarios by Topics

Topic Scenario
Public-Key Cryptography labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/ssh-agent.xml
labs/labtainers/sshlab.xml
labs/labtainers/ssl.xml
Schemes labs/labtainers/pubkey.xml

Human Factors (HF)

HF Scenarios

labs/labtainers/ssl.xml

HF Scenarios by Topics

Topic Scenario
Fitting the Task to the Human labs/labtainers/ssl.xml

Scenario CyBOK Keywords

labs/authentication_and_access_controls/ads_1_authentication.xml

Details

Key Data
Name Authentication lab
Description
Lecture
Slides here

Reading
Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)

Lab
A Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/2I_JSdTu-oI; https://youtu.be/pGcJEML1mRo; https://youtu.be/icC2Zrno_uM; https://youtu.be/Wrg6XZu6Luw
VM names desktop; server; hackerbot_server; kali_cracker

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_1_authentication.xml run

View source

labs/authentication_and_access_controls/ads_2_pam.xml

Details

Key Data
Name Pluggable Authentication Modules lab
Description
Lecture
Watch authentication part 3

Slides continued here

Reading
Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Lab
A short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/z4L6Yv5ry1A; https://youtu.be/-zcnfmoLjYI; https://youtu.be/xHs3LB4Yyrk; https://youtu.be/c2dPdQmaVyo; https://youtu.be/dCBabesIXo8; https://youtu.be/rhdcxhSDqp4; https://youtu.be/PCXK2cK8tpE
VM names desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_2_pam.xml run

View source

labs/authentication_and_access_controls/ads_3_access_controls.xml

Details

Key Data
Name Access Controls lab
Description
Lecture
Watch access controls part 1

Slides here

Reading
Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/yWJyZEFbchQ; https://youtu.be/i0kO_3ExJv4
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_3_access_controls.xml run

View source

labs/authentication_and_access_controls/ads_4_suid.xml

Details

Key Data
Name Set User ID lab
Description
Lecture
Watch access controls part 2

Slides continued here

Reading
Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/viSkkNB777k; https://youtu.be/PGHsb3bg_h4
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_4_suid.xml run

View source

labs/authentication_and_access_controls/ads_5_facls.xml

Details

Key Data
Name Access Control Lists (ACLs) lab
Description
Lecture
Watch access controls part 3

Slides continued here

Reading
Grunbacher, Andreas. "POSIX Access Control Lists on Linux." USENIX Annual Technical Conference, FREENIX Track. 2003.

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.

Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/Bn3NJhgmdLk; https://youtu.be/OT7ifs8PkHI
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_5_facls.xml run

View source

labs/authentication_and_access_controls/ads_6_containers.xml

Details

Key Data
Name Containers lab
Description
Lecture
Sandboxing

Slides here

Reading
Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/f4yBcKkb12g
VM names desktop; hackerbot_server; chroot_esc_server; docker_esc_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_6_containers.xml run

View source

labs/authentication_and_access_controls/ads_7_apparmor.xml

Details

Key Data
Name AppArmor lab
Description
Lecture
Rule-based sandboxes

Mobile device sandboxes

Slides continued here

Lectures for the next two weeks
Secure software development

Secure design principles

Slides

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/Xgs5akM6ayc
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes

Command to start scenario:

ruby secgen.rb -s scenario/labs/authentication_and_access_controls/ads_7_apparmor.xml run

View source

labs/introducing_attacks/1_intro_linux.xml

Details

Key Data
Name Introduction to Linux and Security lab
Description
Introduction
This topic covers lots of ground regarding fundamentals of Linux and free open source software (FOSS).

Lecture
Slides here

Reading
Chapters 1 "Introduction" and 2 "Unix History and Lineage": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Suggested:

Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability common network attacks

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/1_intro_linux.xml run

View source

labs/introducing_attacks/2_malware_msf_payloads.xml

Details

Key Data
Name Malware and an Introduction to Metasploit and Payloads
Description
Introduction
This week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program.

Lecture
Slides here

Reading
Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library

Suggested:

Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779)

Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
Lab
Lab sheet here.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/2_malware_msf_payloads.xml run

View source

labs/introducing_attacks/3_vulnerabilities.xml

Details

Key Data
Name Vulnerabilities, Exploits, and Remote Access Payloads
Description
Introduction
This week we will cover one of the major threats in computer security: software vulnerabilities. You will learn about the danger these pose, and start to learn about the power of the Metasploit framework, a popular hacking and penetration testing tool. You will learn and apply a number of important concepts such as payloads, shell code, bind and reverse shells, and both remote and local (client-side) exploits.

Lecture
Slides here

Reading
Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; linux_victim_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/3_vulnerabilities.xml run

View source

labs/introducing_attacks/4_dns_footprinting.xml

Details

Key Data
Name Information Gathering: Footprinting
Description
Introduction
The topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to).

Lecture
Slides here

Reading
Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library

Lab
Lab sheet here.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - DNS ZONE TRANSFER; EXPLOITATION FRAMEWORKS

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/4_dns_footprinting.xml run

View source

labs/introducing_attacks/5_scanning.xml

Details

Key Data
Name Information Gathering: Scanning
Description
Introduction
This week we learn how to scan networks to get an understanding of and to map out a network. Scanning is a critical stage for an attacker, since it can give them the information they need in order to launch an attack.

Reading
Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names linux_victim_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/5_scanning.xml run

View source

labs/introducing_attacks/6_exploitation.xml

Details

Key Data
Name From Scanning to Exploitation
Description
Introduction
This week we learn how we can scan networks to discover vulnerable services, and exploit them.

Reading
Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_server; linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/6_exploitation.xml run

View source

labs/introducing_attacks/7_post-exploitation.xml

Details

Key Data
Name Post-exploitation
Description
Introduction
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an expliot has been successful.

Suggested reading
An excellent resource is Metaploit Unleashed.

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_server; linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain; attack on confidentiality; integrity; availability

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/7_post-exploitation.xml run

View source

labs/introducing_attacks/8_vulnerability_analysis.xml

Details

Key Data
Name Vulnerability Analysis
Description
Introduction
It is important for organisations to manage the security of their systems and for security professionals to efficiently scan networks for vulnerabilities.

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) PENETRATION TESTING VULNERABILITY ANALYSIS / VULNERABILITY SCANNING; AUDIT APPROACH; PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to start scenario:

ruby secgen.rb -s scenario/labs/introducing_attacks/8_vulnerability_analysis.xml run

View source

labs/labtainers/acl-hackerbot-flags.xml

Details

Key Data
Name Labtainers lab: acl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/acl-hackerbot-flags.xml run

View source

labs/labtainers/acl.xml

Details

Key Data
Name Labtainers lab: acl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/acl.xml run

View source

labs/labtainers/arp-spoof.xml

Details

Key Data
Name Labtainers lab: arp-spoof
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; MITM (MAN-IN-THE-MIDDLE ATTACK); MAN-IN-THE-MIDDLE ATTACK (MITM); ATTACK(S) - ARP

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/arp-spoof.xml run

View source

labs/labtainers/backups.xml

Details

Key Data
Name Labtainers lab: backups
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/backups.xml run

View source

labs/labtainers/backups2.xml

Details

Key Data
Name Labtainers lab: backups2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/backups2.xml run

View source

labs/labtainers/bufoverflow.xml

Details

Key Data
Name Labtainers lab: bufoverflow
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/bufoverflow.xml run

View source

labs/labtainers/capabilities.xml

Details

Key Data
Name Labtainers lab: capabilities
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
(OSVS) Primitives for Isolation and Mediation capabilities; Rule-based controls: Course grained: Linux capabilities

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/capabilities.xml run

View source

labs/labtainers/centos-log.xml

Details

Key Data
Name Labtainers lab: centos-log
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/centos-log.xml run

View source

labs/labtainers/centos-log2.xml

Details

Key Data
Name Labtainers lab: centos-log2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/centos-log2.xml run

View source

labs/labtainers/cyberciege.xml

Details

Key Data
Name Labtainers lab: cyberciege
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/cyberciege.xml run

View source

labs/labtainers/denyhost.xml

Details

Key Data
Name Labtainers lab: denyhost
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems; intrusion prevention systems

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/denyhost.xml run

View source

labs/labtainers/dmz-example.xml

Details

Key Data
Name Labtainers lab: dmz-example
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools DEMILITARISED ZONE (DMZ)

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/dmz-example.xml run

View source

labs/labtainers/dmz-lab.xml

Details

Key Data
Name Labtainers lab: dmz-lab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools DEMILITARISED ZONE (DMZ)

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/dmz-lab.xml run

View source

labs/labtainers/file-deletion.xml

Details

Key Data
Name Labtainers lab: file-deletion
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Operating System Analysis storage forensics; data recovery and file content carving

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/file-deletion.xml run

View source

labs/labtainers/file-integrity.xml

Details

Key Data
Name Labtainers lab: file-integrity
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication access control; Protecting integrity

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/file-integrity.xml run

View source

labs/labtainers/formatstring.xml

Details

Key Data
Name Labtainers lab: formatstring
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; Exploit development; Mitigation bypass: ASLR

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/formatstring.xml run

View source

labs/labtainers/gdblesson.xml

Details

Key Data
Name Labtainers lab: gdblesson
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/gdblesson.xml run

View source

labs/labtainers/ida.xml

Details

Key Data
Name Labtainers lab: ida
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/ida.xml run

View source

labs/labtainers/iptables-ics.xml

Details

Key Data
Name Labtainers lab: iptables-ics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/iptables-ics.xml run

View source

labs/labtainers/iptables.xml

Details

Key Data
Name Labtainers lab: iptables
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools FIREWALLS; IPTables

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/iptables.xml run

View source

labs/labtainers/iptables2.xml

Details

Key Data
Name Labtainers lab: iptables2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools FIREWALLS; IPTables

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/iptables2.xml run

View source

labs/labtainers/ldap.xml

Details

Key Data
Name Labtainers lab: ldap
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; authentication in distributed systems

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/ldap.xml run

View source

labs/labtainers/local-dns.xml

Details

Key Data
Name Labtainers lab: local-dns
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/local-dns.xml run

View source

labs/labtainers/macs-hash.xml

Details

Key Data
Name Labtainers lab: macs-hash
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/macs-hash.xml run

View source

labs/labtainers/metasploit.xml

Details

Key Data
Name Labtainers lab: metasploit
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/metasploit.xml run

View source

labs/labtainers/nix-commands.xml

Details

Key Data
Name Labtainers lab: nix-commands
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/nix-commands.xml run

View source

labs/labtainers/nmap-discovery.xml

Details

Key Data
Name Labtainers lab: nmap-discovery
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/nmap-discovery.xml run

View source

labs/labtainers/nmap-ssh.xml

Details

Key Data
Name Labtainers lab: nmap-ssh
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/nmap-ssh.xml run

View source

labs/labtainers/onewayhash.xml

Details

Key Data
Name Labtainers lab: onewayhash
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/onewayhash.xml run

View source

labs/labtainers/packet-introspection.xml

Details

Key Data
Name Labtainers lab: packet-introspection
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics network connections; data recovery and file content carving

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/packet-introspection.xml run

View source

labs/labtainers/pass-crack.xml

Details

Key Data
Name Labtainers lab: pass-crack
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/pass-crack.xml run

View source

labs/labtainers/pcapanalysis.xml

Details

Key Data
Name Labtainers lab: pcapanalysis
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics network connections

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/pcapanalysis.xml run

View source

labs/labtainers/plc-app.xml

Details

Key Data
Name Labtainers lab: plc-app
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/plc-app.xml run

View source

labs/labtainers/plc-forensics-adv.xml

Details

Key Data
Name Labtainers lab: plc-forensics-adv
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/plc-forensics-adv.xml run

View source

labs/labtainers/plc-forensics.xml

Details

Key Data
Name Labtainers lab: plc-forensics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/plc-forensics.xml run

View source

labs/labtainers/plc.xml

Details

Key Data
Name Labtainers lab: plc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/plc.xml run

View source

labs/labtainers/pubkey.xml

Details

Key Data
Name Labtainers lab: pubkey
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Schemes TLS

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/pubkey.xml run

View source

labs/labtainers/radius.xml

Details

Key Data
Name Labtainers lab: radius
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; authentication in distributed systems

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/radius.xml run

View source

labs/labtainers/remote-dns.xml

Details

Key Data
Name Labtainers lab: remote-dns
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/remote-dns.xml run

View source

labs/labtainers/retlibc.xml

Details

Key Data
Name Labtainers lab: retlibc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/retlibc.xml run

View source

labs/labtainers/routing-basics.xml

Details

Key Data
Name Labtainers lab: routing-basics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Internet Architecture network layer security

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/routing-basics.xml run

View source

labs/labtainers/routing-basics2.xml

Details

Key Data
Name Labtainers lab: routing-basics2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Internet Architecture network layer security

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/routing-basics2.xml run

View source

labs/labtainers/setuid-env.xml

Details

Key Data
Name Labtainers lab: setuid-env
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/setuid-env.xml run

View source

labs/labtainers/snort.xml

Details

Key Data
Name Labtainers lab: snort
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/snort.xml run

View source

labs/labtainers/softplc.xml

Details

Key Data
Name Labtainers lab: softplc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/softplc.xml run

View source

labs/labtainers/softplc2.xml

Details

Key Data
Name Labtainers lab: softplc2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/softplc2.xml run

View source

labs/labtainers/sql-inject.xml

Details

Key Data
Name Labtainers lab: sql-inject
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities Web vulnerabilities / OWASP Top 10; API vulnerabilities

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/sql-inject.xml run

View source

labs/labtainers/ssh-agent.xml

Details

Key Data
Name Labtainers lab: ssh-agent
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/ssh-agent.xml run

View source

labs/labtainers/sshlab.xml

Details

Key Data
Name Labtainers lab: sshlab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/sshlab.xml run

View source

labs/labtainers/ssl.xml

Details

Key Data
Name Labtainers lab: ssl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures

Command to start scenario:

ruby secgen.rb -s scenario/labs/labtainers/ssl.xml run

View source

labs/response_and_investigation/1_integrity_protection.xml

Details

Key Data
Name Integrity protection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Protecting integrity with file attributes; Protecting integrity with read-only filesystems.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Protecting integrity

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/1_integrity_protection.xml run

View source

labs/response_and_investigation/2_integrity_detection.xml

Details

Key Data
Name Integrity detection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Detecting changes to resources using backups; File integrity checkers; Detecting changes to resources using package management.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/2_integrity_detection.xml run

View source

labs/response_and_investigation/3_backups_and_recovery.xml

Details

Key Data
Name Backups lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Rsync, and backups and restoring data using differential and incremental backups.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; backup_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/3_backups_and_recovery.xml run

View source

labs/response_and_investigation/4_ids.xml

Details

Key Data
Name IDS lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/4_ids.xml run

View source

labs/response_and_investigation/5_ids_rules.xml

Details

Key Data
Name IDS rules lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/5_ids_rules.xml run

View source

labs/response_and_investigation/6_exfiltration_detection.xml

Details

Key Data
Name Exfiltration detection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/6_exfiltration_detection.xml run

View source

labs/response_and_investigation/7_live_analysis.xml

Details

Key Data
Name Live analysis lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; compromised_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics process information; file information; network connections; artifacts and fragments; challenges of live forensics

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/7_live_analysis.xml run

View source

labs/response_and_investigation/8_dead_analysis.xml

Details

Key Data
Name Dead analysis lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; hackerbot_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Operating System Analysis storage forensics; data recovery and file content carving; Timeline analysis

Command to start scenario:

ruby secgen.rb -s scenario/labs/response_and_investigation/8_dead_analysis.xml run

View source

labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml

Details

Key Data
Name Introdution to Malware analysis lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml run

View source

labs/software_and_malware_analysis/3_c_and_asm.xml

Details

Key Data
Name C and Assembly lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

This week, we will finish our crash course in C programming by looking at structs, a data type used to represent composite data, memory management, one of the biggest strengths of the C language, and bitwise operators, which you will find particularly helpful when looking at disassembled code. We will then change our focus to assembly language. Starting with some basics, we will familiarise ourselves with the syntax and organisation of decompiled code before moving onto recognising the structures we learned last week in the assembly code.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thalita Vergilio
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/3_c_and_asm.xml run

View source

labs/software_and_malware_analysis/4_asm.xml

Details

Key Data
Name Recognising C Code Constructs in Assembly lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

We start with understanding how branching and conditionals are represented in assembly. We then move onto learning how to identify the common C code constructs we saw in previous weeks in disassembled code, namely loops, function calls, switch statements, arrays and structs.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thalita Vergilio
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/4_asm.xml run

View source

labs/software_and_malware_analysis/5_ghidra.xml

Details

Key Data
Name Ghidra lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/5_ghidra.xml run

View source

labs/software_and_malware_analysis/6_ghidra_analysis.xml

Details

Key Data
Name Ghidra lab analysis
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

There are two binaries to practice SRE with Ghidra.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/6_ghidra_analysis.xml run

View source

labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml

Details

Key Data
Name Ghidra lab with LIVE MALWARE SAMPLES
Description You will find live malware samples in /opt/theZoo.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml run

View source

labs/software_and_malware_analysis/7_dynamic.xml

Details

Key Data
Name Dynamic analysis SRE
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

There are binaries to perform dynamic SRE.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; DYNAMIC ANALYSIS

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/7_dynamic.xml run

View source

labs/software_and_malware_analysis/8_anti_sre.xml

Details

Key Data
Name Anti-SRE
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

There are binaries to perform dynamic SRE.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; anti-analysis and evasion techniques

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/8_anti_sre.xml run

View source

labs/software_and_malware_analysis/9_malware_behaviour.xml

Details

Key Data
Name Malware Behaviour
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

There are binaries to perform dynamic SRE.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_and_malware_analysis/9_malware_behaviour.xml run

View source

labs/software_security_exploitation/1_c_asm_iof.xml

Details

Key Data
Name Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows
Description

A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities Integer overflow

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/1_c_asm_iof.xml run

View source

labs/software_security_exploitation/2_race_conditions_format_str.xml

Details

Key Data
Name Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks
Description

A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities race condition vulnerabilities; structured output generation vulnerabilities; Format string attacks

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/2_race_conditions_format_str.xml run

View source

labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml

Details

Key Data
Name Bug Hunting and Fuzzing
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; kali; desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Detection of Vulnerabilities dynamic detection

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml run

View source

labs/software_security_exploitation/4_exploit_development.xml

Details

Key Data
Name Exploit Development
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; kali; windows_victim_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/4_exploit_development.xml run

View source

labs/software_security_exploitation/5_linux_bof_format.xml

Details

Key Data
Name Linux Buffer Overflows and Advanced Format String Attacks
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos
VM names metactf_desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows; Format string attacks

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/5_linux_bof_format.xml run

View source

labs/software_security_exploitation/6_linux_stack_bof.xml

Details

Key Data
Name Writing Exploits: Linux and Stack-smashing Buffer Overflows
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/6_linux_stack_bof.xml run

View source

labs/software_security_exploitation/7_linux_nx_bypass.xml

Details

Key Data
Name Linux bypassing NX bit with return-to-libc
Description
Similar to last week. Same C code, just compiled w/ stack protections and non-executable stack.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/7_linux_nx_bypass.xml run

View source

labs/software_security_exploitation/8_linux_aslr_bypass.xml

Details

Key Data
Name Linux ASLR bypass
Description
Practical challenges to bypass ASLR, PIE and RelRO.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows

Command to start scenario:

ruby secgen.rb -s scenario/labs/software_security_exploitation/8_linux_aslr_bypass.xml run

View source

labs/web_security/websec_lab.xml

Details

Key Data
Name Web security lab environment
Description An environment for web security labs. Kali Linux with Damn Vulnerable Web App server, WebGoat, and web sec tools.
Type lab-environment; ctf-lab
Author Z. Cliffe Schreuders
Linked videos
VM names kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
(WMS) Fundamental Concepts and Approaches web PKI and HTTPS; authentication; cookies; passwords and alternatives; JAVASCRIPT / HYPERTEXT MARKUP LANGUAGE (HTML) / CASCADING STYLE SHEETS (CSS) / HYPERTEXT TRANSFER PROTOCOL (HTTP)\n\t\tCOOKIES; HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING; Broken Access Control / Insecure Direct Object References; SESSION HIJACKING; REPRESENTATIONAL STATE TRANSFER (REST)

Command to start scenario:

ruby secgen.rb -s scenario/labs/web_security/websec_lab.xml run

View source