Hacktivity Lab Sheets

Welcome to the Hacktivity SecGen lab sheets repository. This site contains hands-on cybersecurity lab exercises designed for educational purposes.

Available Labs

Cyber security landscape

Human Factors and Social Engineering: Phishing

Learn about human factors in cybersecurity through hands-on phishing simulation. Practice social engineering techniques, email spoofing, and creating malicious attachments to understand how attackers exploit human psychology.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: HF: Human Error AB: Attacks MAT: Attacks and exploitation WAM: Client-Side Vulnerabilities and Mitigations
phishing social-engineering email-security human-factors malware macros

Introduction to Cryptography: Encoding and Encryption

Learn essential cryptography concepts through hands-on practice with encoding schemes, hash algorithms, OpenSSL, and GPG. Master data encoding, symmetric and asymmetric encryption, and key management.

Authors: Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AC: Algorithms, Schemes and Protocols F: Artifact Analysis WAM: Fundamental Concepts and Approaches
cryptography encoding encryption openssl gpg base64 aes des

Documentation

Lab Sheet Highlighting Guide (AI Instructions)

A comprehensive guide for AI assistants on how to properly highlight lab sheets using the new highlighting system. This guide contains examples and instructions for converting plain text lab sheets into properly highlighted versions.

Author: AI Assistant
License: CC BY-SA 4.0
ai-guide highlighting lab-formatting documentation

Introducing attacks

Introduction to Linux and Security

Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: NS: Network Protocols and Vulnerability SOIM: PENETRATION TESTING
linux command-line ssh kali networking security

Malware and an Introduction to Metasploit and Payloads

Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, Abi Yusuf, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis MAT: Attacks and exploitation SOIM: PENETRATION TESTING
malware metasploit payloads trojan ethical-hacking penetration-testing

Vulnerabilities, Exploits, and Remote Access Payloads

Learn about software vulnerabilities, exploits, and payloads including bind shells, reverse shells, and Metasploit framework usage for penetration testing. This lab covers practical exploitation techniques using real-world examples like Adobe Reader vulnerabilities and Distcc remote code execution.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Attacks and exploitation SOIM: PENETRATION TESTING
vulnerabilities exploits payloads metasploit bind-shell reverse-shell penetration-testing

Information Gathering: Scanning

Learn network scanning techniques including ping sweeps, port scanning, service identification, and OS detection using tools like Nmap and custom bash scripts. This lab covers reconnaissance and network mapping for penetration testing.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware NS: PENETRATION TESTING SOIM: PENETRATION TESTING
scanning nmap reconnaissance network-mapping penetration-testing ping-sweeps port-scanning

From Scanning to Exploitation

Learn hands-on scanning and exploitation techniques, including network scanning with Nmap, using Metasploit and Armitage for exploitation, and searching vulnerability databases to gain control of target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Tom Shaw, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware SS: Categories of Vulnerabilities MAT: Attacks and exploitation SOIM: PENETRATION TESTING
exploitation metasploit nmap armitage vulnerability scanning

Post-exploitation

Learn post-exploitation techniques including privilege escalation, information gathering, password hash collection, and advanced payloads like Meterpreter for maintaining access and pivoting through compromised systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware MAT: Attacks and exploitation SOIM: PENETRATION TESTING
post-exploitation metasploit meterpreter privilege-escalation pivoting keylogging armitage

Vulnerability Analysis

Learn vulnerability assessment techniques using industry-standard tools like Nmap NSE, Nessus, and Nikto to identify security weaknesses in target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: PENETRATION TESTING MAT: Attacks and exploitation
vulnerability-assessment nmap nessus nikto security-scanning penetration-testing

Feeling Blu Challenge - Web Security CTF

A comprehensive CTF challenge focusing on web security, penetration testing, and privilege escalation. Exploit vulnerabilities in a web server to gain access and achieve root access.

Authors: Anatoliy Gorbenko, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches AAA: Authentication WAM: Server-Side Vulnerabilities and Mitigations MAT: Attacks and exploitation SS: Categories of Vulnerabilities SOIM: PENETRATION TESTING AAA: Authorisation OSV: Primitives for Isolation and Mediation AB: Models MAT: Malicious Activities by Malware AC: Symmetric Cryptography
ctf web-security penetration-testing privilege-escalation metasploit owasp-zap

Software and malware analysis

Anti-Reverse-Engineering

Advanced anti-reverse-engineering techniques including anti-debugging, anti-disassembly, and code obfuscation methods used by malware to thwart analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
anti-reverse-engineering anti-debugging anti-disassembly code-obfuscation malware-analysis ctf

Malware Behaviour - Reverse Engineering and Analysis of the Coconut Malware Sample

Advanced malware analysis lab using Hackerbot to analyze the Coconut malware sample, including packer identification, network analysis, backdoor detection, and YARA rule creation.

Authors: Tom Shaw, Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
malware-analysis reverse-engineering hackerbot coconut backdoor yara network-analysis ctf

Introduction to Dynamic and Static Analysis

Learn fundamental malware analysis techniques including static and dynamic analysis of binary executables, and reverse engineering.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis reverse-engineering static-analysis dynamic-analysis ctf binary-analysis

Introduction to C Programming

Learn fundamental C programming concepts including data types, arrays, strings, conditionals, loops, functions, and pointers for malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Technical Underpinning
c-programming low-level-programming memory-management pointers malware-analysis reverse-engineering

From C to Assembly Language

Learn C programming concepts including structs, memory management, bitwise operators, and assembly language for 32-bit x86 processors. Practice reverse engineering and low-level programming skills.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis MAT: Technical Underpinning
c-programming assembly memory-management bitwise-operators reverse-engineering low-level-programming

Recognising C Code Constructs in Assembly

Learn to recognize C code constructs in assembly language including branching, conditionals, loops, switch statements, arrays, strings, and structs for reverse engineering and malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
assembly reverse-engineering malware-analysis c-programming low-level-programming

Ghidra Software Reverse Engineering (SRE)

Learn software reverse engineering using Ghidra, including ELF file structure, disassembly, decompilation, and CTF challenges for malware analysis.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
ghidra reverse-engineering elf disassembly decompilation malware-analysis ctf

Dynamic Analysis and Debugging

Learn dynamic malware analysis using GDB debugger, including breakpoints, memory examination, register analysis, and CTF challenges for runtime behavior analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging malware-analysis breakpoints memory-analysis ctf

Debugging Continued

Advanced dynamic analysis using GDB debugger with 8 challenging CTF exercises covering XOR encryption, memory analysis, register examination, and advanced debugging techniques.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging advanced ctf xor memory-analysis register-analysis

Malware Behaviour: Flag Hints

Advanced malware behavior analysis using dynamic reverse engineering techniques including process forking, network communication, library preloading, and binary unpacking.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis dynamic-analysis process-forking network-analysis library-preloading binary-unpacking ctf

Software security exploitation

Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows

Learn fundamental software vulnerability concepts through C programming, assembly debugging, and buffer overflow exploitation. Master GDB debugging, understand stack structure, and practice secure coding techniques.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities
software-security c-programming assembly buffer-overflow gdb debugging vulnerabilities

Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks

Learn advanced software vulnerability concepts including command injection, race conditions, and format string attacks. Master validation, sanitization, and secure coding practices through hands-on exercises.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities
software-security injection-attacks race-conditions format-strings validation sanitization ctf

Bug Hunting Using Fuzzing and Static Analysis

Learn advanced bug hunting techniques including fuzzing and static analysis to identify software vulnerabilities. This lab covers manual code auditing, fuzzing with Spike, Metasploit FTP fuzzing, and CTF challenges.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Detection of Vulnerabilities
fuzzing static-analysis bug-hunting vulnerability-detection spike metasploit

Exploit Development: MSF and Windows Stack-smashing Buffer Overflow

Learn advanced exploit development techniques including Windows stack-smashing buffer overflows, Metasploit module creation, and remote system compromise through hands-on exploitation of a vulnerable FTP server.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
exploit-development buffer-overflow metasploit windows assembly shellcode

Exploit Development: Linux and Stack-smashing Buffer Overflows

Learn to identify and exploit buffer overflow vulnerabilities on Linux systems, including manual exploitation techniques and Metasploit exploit development. This lab covers CTF challenges with increasing complexity.

Authors: Z. Cliffe Schreuders, and Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
buffer-overflow exploit-development metasploit linux ctf shellcode

Linux bypassing NX bit with return-to-libc

Learn to bypass Non-Executable (NX) stack protection using return-to-libc attacks. Develop exploits that redirect program execution to functions within the Standard C Library (libc) without executing external code on the stack.

Authors: Z. Cliffe Schreuders, and Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Mitigating Exploitation MAT: Attacks and exploitation
nx-bypass return-to-libc buffer-overflow exploit-development metasploit

Bypassing Address Space Layout Randomisation (ASLR)

Learn how to bypass Address Space Layout Randomization (ASLR) through information leaks and brute-force attacks. Develop exploits using the Metasploit framework to overcome ASLR, PIE, and RelRO protections.

Authors: Thomas Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Mitigating Exploitation MAT: Attacks and exploitation
aslr exploitation metasploit buffer-overflow security

Linux Buffer Overflows and Advanced Format String Attacks

Learn advanced software security exploitation techniques including format string attacks and buffer overflow vulnerabilities on Linux systems.

Authors: Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
buffer-overflow format-string exploitation linux assembly gdb

Notes for Ch3_Format5

Notes for Ch3_Format5.

Authors: Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities
buffer-overflow format-string exploitation linux assembly gdb

Systems security

Active Directory Setup Guide

Learn how to set up Active Directory Domain Services on Windows Server 2016, configure DNS, create users, and join Windows and Linux clients to an Active Directory domain.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation
active-directory windows-server domain-controller authentication identity-management dns adds windows directory-services

LDAP Authentication Setup Guide

Learn how to set up centralised LDAP authentication between an OpenLDAP server and Linux clients using nslcd and PAM for enterprise identity management.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation
ldap authentication identity-management openldap nslcd pam directory-services phpldapadmin linux

Network Authentication and Directory Services

Introduction to centralised authentication, directory services, and identity management using Active Directory and LDAP in enterprise environments.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation NS: Network Security
active-directory ldap authentication identity-management directory-services domain-controller enterprise-security authorisation

Web security

Introducing Web Security: Web and Local Proxy Fundamentals

Learn web security fundamentals through hands-on exercises including HTTP client-server interactions, web server simulation with netcat, dynamic PHP pages, and security testing with OWASP ZAP proxy.

Authors: Z. Cliffe Schreuders, Andrew Scholey, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Detection of Vulnerabilities
web-security http php zap proxy fuzzing owasp

Web Security: Sessions and Cookies

Learn about web security sessions and cookies through hands-on exercises using DVWA, OWASP WebGoat, and Security Shepherd. Understand cookie mechanisms, session management, and security vulnerabilities.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Detection of Vulnerabilities
web-security sessions cookies dvwa zap owasp

Web Security: Cross-Site Scripting

Learn about Cross-Site Scripting (XSS) attacks through hands-on exercises using DVWA, WebGoat, and Security Shepherd. Understand reflected, stored, and DOM-based XSS vulnerabilities and their mitigation.

Authors: Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security xss cross-site-scripting dvwa webgoat security-shepherd

Web Security: SQL Injection

Learn about SQL injection attacks through hands-on exercises using DVWA, OWASP WebGoat, and Security Shepherd. Understand SQL injection vulnerabilities, blind SQL injection, and mitigation strategies.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security sql-injection dvwa webgoat security-shepherd blind-sql-injection

Web Security: Advanced Injection

Learn about advanced injection attacks including OS command injection and automated SQL injection using sqlmap. Understand command injection vulnerabilities and automated penetration testing tools.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security sql-injection command-injection sqlmap dvwa webgoat security-shepherd

Cross-Site Request Forgery

Learn about Cross-Site Request Forgery (CSRF) attacks through hands-on exercises using DVWA, OWASP WebGoat and WebWolf, and Security Shepherd. Understand CSRF vulnerabilities, CORS limitations, and practical skills in executing and defending against such attacks.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security csrf dvwa webgoat webwolf security-shepherd

Web Security: Additional Challenges

Complete additional web security challenges using Security Shepherd platform, focusing on cryptographic storage vulnerabilities and unvalidated redirects.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security cryptographic-storage redirects security-shepherd ctf

Network Security: Labtainers Network Labs

Learn network security fundamentals through hands-on Labtainers exercises including packet analysis with Wireshark and Tshark, firewall configuration with iptables, and VPN implementation using OpenVPN.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: Monitor: Data Sources F: Main Memory Forensics NS: Network Defence Tools NS: Internet Architecture WAM: FIREWALLS
network-security packet-analysis wireshark iptables vpn openvpn labtainers

General Labs

Human Factors and Social Engineering: Phishing

Learn about human factors in cybersecurity through hands-on phishing simulation. Practice social engineering techniques, email spoofing, and creating malicious attachments to understand how attackers exploit human psychology.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: HF: Human Error AB: Attacks MAT: Attacks and exploitation WAM: Client-Side Vulnerabilities and Mitigations
phishing social-engineering email-security human-factors malware macros

Introduction to Cryptography: Encoding and Encryption

Learn essential cryptography concepts through hands-on practice with encoding schemes, hash algorithms, OpenSSL, and GPG. Master data encoding, symmetric and asymmetric encryption, and key management.

Authors: Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AC: Algorithms, Schemes and Protocols F: Artifact Analysis WAM: Fundamental Concepts and Approaches
cryptography encoding encryption openssl gpg base64 aes des

Lab Sheet Highlighting Guide (AI Instructions)

A comprehensive guide for AI assistants on how to properly highlight lab sheets using the new highlighting system. This guide contains examples and instructions for converting plain text lab sheets into properly highlighted versions.

Author: AI Assistant
License: CC BY-SA 4.0
ai-guide highlighting lab-formatting documentation

Introduction to Linux and Security

Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: NS: Network Protocols and Vulnerability SOIM: PENETRATION TESTING
linux command-line ssh kali networking security

Malware and an Introduction to Metasploit and Payloads

Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, Abi Yusuf, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis MAT: Attacks and exploitation SOIM: PENETRATION TESTING
malware metasploit payloads trojan ethical-hacking penetration-testing

Vulnerabilities, Exploits, and Remote Access Payloads

Learn about software vulnerabilities, exploits, and payloads including bind shells, reverse shells, and Metasploit framework usage for penetration testing. This lab covers practical exploitation techniques using real-world examples like Adobe Reader vulnerabilities and Distcc remote code execution.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Attacks and exploitation SOIM: PENETRATION TESTING
vulnerabilities exploits payloads metasploit bind-shell reverse-shell penetration-testing

Information Gathering: Scanning

Learn network scanning techniques including ping sweeps, port scanning, service identification, and OS detection using tools like Nmap and custom bash scripts. This lab covers reconnaissance and network mapping for penetration testing.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware NS: PENETRATION TESTING SOIM: PENETRATION TESTING
scanning nmap reconnaissance network-mapping penetration-testing ping-sweeps port-scanning

From Scanning to Exploitation

Learn hands-on scanning and exploitation techniques, including network scanning with Nmap, using Metasploit and Armitage for exploitation, and searching vulnerability databases to gain control of target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Tom Shaw, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware SS: Categories of Vulnerabilities MAT: Attacks and exploitation SOIM: PENETRATION TESTING
exploitation metasploit nmap armitage vulnerability scanning

Post-exploitation

Learn post-exploitation techniques including privilege escalation, information gathering, password hash collection, and advanced payloads like Meterpreter for maintaining access and pivoting through compromised systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware MAT: Attacks and exploitation SOIM: PENETRATION TESTING
post-exploitation metasploit meterpreter privilege-escalation pivoting keylogging armitage

Vulnerability Analysis

Learn vulnerability assessment techniques using industry-standard tools like Nmap NSE, Nessus, and Nikto to identify security weaknesses in target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: PENETRATION TESTING MAT: Attacks and exploitation
vulnerability-assessment nmap nessus nikto security-scanning penetration-testing

Feeling Blu Challenge - Web Security CTF

A comprehensive CTF challenge focusing on web security, penetration testing, and privilege escalation. Exploit vulnerabilities in a web server to gain access and achieve root access.

Authors: Anatoliy Gorbenko, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches AAA: Authentication WAM: Server-Side Vulnerabilities and Mitigations MAT: Attacks and exploitation SS: Categories of Vulnerabilities SOIM: PENETRATION TESTING AAA: Authorisation OSV: Primitives for Isolation and Mediation AB: Models MAT: Malicious Activities by Malware AC: Symmetric Cryptography
ctf web-security penetration-testing privilege-escalation metasploit owasp-zap

Anti-Reverse-Engineering

Advanced anti-reverse-engineering techniques including anti-debugging, anti-disassembly, and code obfuscation methods used by malware to thwart analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
anti-reverse-engineering anti-debugging anti-disassembly code-obfuscation malware-analysis ctf

Malware Behaviour - Reverse Engineering and Analysis of the Coconut Malware Sample

Advanced malware analysis lab using Hackerbot to analyze the Coconut malware sample, including packer identification, network analysis, backdoor detection, and YARA rule creation.

Authors: Tom Shaw, Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
malware-analysis reverse-engineering hackerbot coconut backdoor yara network-analysis ctf

Introduction to Dynamic and Static Analysis

Learn fundamental malware analysis techniques including static and dynamic analysis of binary executables, and reverse engineering.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis reverse-engineering static-analysis dynamic-analysis ctf binary-analysis

Introduction to C Programming

Learn fundamental C programming concepts including data types, arrays, strings, conditionals, loops, functions, and pointers for malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Technical Underpinning
c-programming low-level-programming memory-management pointers malware-analysis reverse-engineering

From C to Assembly Language

Learn C programming concepts including structs, memory management, bitwise operators, and assembly language for 32-bit x86 processors. Practice reverse engineering and low-level programming skills.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis MAT: Technical Underpinning
c-programming assembly memory-management bitwise-operators reverse-engineering low-level-programming

Recognising C Code Constructs in Assembly

Learn to recognize C code constructs in assembly language including branching, conditionals, loops, switch statements, arrays, strings, and structs for reverse engineering and malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
assembly reverse-engineering malware-analysis c-programming low-level-programming

Ghidra Software Reverse Engineering (SRE)

Learn software reverse engineering using Ghidra, including ELF file structure, disassembly, decompilation, and CTF challenges for malware analysis.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
ghidra reverse-engineering elf disassembly decompilation malware-analysis ctf

Dynamic Analysis and Debugging

Learn dynamic malware analysis using GDB debugger, including breakpoints, memory examination, register analysis, and CTF challenges for runtime behavior analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging malware-analysis breakpoints memory-analysis ctf

Debugging Continued

Advanced dynamic analysis using GDB debugger with 8 challenging CTF exercises covering XOR encryption, memory analysis, register examination, and advanced debugging techniques.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging advanced ctf xor memory-analysis register-analysis

Malware Behaviour: Flag Hints

Advanced malware behavior analysis using dynamic reverse engineering techniques including process forking, network communication, library preloading, and binary unpacking.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis dynamic-analysis process-forking network-analysis library-preloading binary-unpacking ctf

Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows

Learn fundamental software vulnerability concepts through C programming, assembly debugging, and buffer overflow exploitation. Master GDB debugging, understand stack structure, and practice secure coding techniques.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities
software-security c-programming assembly buffer-overflow gdb debugging vulnerabilities

Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks

Learn advanced software vulnerability concepts including command injection, race conditions, and format string attacks. Master validation, sanitization, and secure coding practices through hands-on exercises.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities
software-security injection-attacks race-conditions format-strings validation sanitization ctf

Bug Hunting Using Fuzzing and Static Analysis

Learn advanced bug hunting techniques including fuzzing and static analysis to identify software vulnerabilities. This lab covers manual code auditing, fuzzing with Spike, Metasploit FTP fuzzing, and CTF challenges.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Detection of Vulnerabilities
fuzzing static-analysis bug-hunting vulnerability-detection spike metasploit

Exploit Development: MSF and Windows Stack-smashing Buffer Overflow

Learn advanced exploit development techniques including Windows stack-smashing buffer overflows, Metasploit module creation, and remote system compromise through hands-on exploitation of a vulnerable FTP server.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
exploit-development buffer-overflow metasploit windows assembly shellcode

Exploit Development: Linux and Stack-smashing Buffer Overflows

Learn to identify and exploit buffer overflow vulnerabilities on Linux systems, including manual exploitation techniques and Metasploit exploit development. This lab covers CTF challenges with increasing complexity.

Authors: Z. Cliffe Schreuders, and Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
buffer-overflow exploit-development metasploit linux ctf shellcode

Linux bypassing NX bit with return-to-libc

Learn to bypass Non-Executable (NX) stack protection using return-to-libc attacks. Develop exploits that redirect program execution to functions within the Standard C Library (libc) without executing external code on the stack.

Authors: Z. Cliffe Schreuders, and Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Mitigating Exploitation MAT: Attacks and exploitation
nx-bypass return-to-libc buffer-overflow exploit-development metasploit

Bypassing Address Space Layout Randomisation (ASLR)

Learn how to bypass Address Space Layout Randomization (ASLR) through information leaks and brute-force attacks. Develop exploits using the Metasploit framework to overcome ASLR, PIE, and RelRO protections.

Authors: Thomas Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities SS: Mitigating Exploitation MAT: Attacks and exploitation
aslr exploitation metasploit buffer-overflow security

Linux Buffer Overflows and Advanced Format String Attacks

Learn advanced software security exploitation techniques including format string attacks and buffer overflow vulnerabilities on Linux systems.

Authors: Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities MAT: Attacks and exploitation
buffer-overflow format-string exploitation linux assembly gdb

Notes for Ch3_Format5

Notes for Ch3_Format5.

Authors: Thomas Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SS: Categories of Vulnerabilities
buffer-overflow format-string exploitation linux assembly gdb

Active Directory Setup Guide

Learn how to set up Active Directory Domain Services on Windows Server 2016, configure DNS, create users, and join Windows and Linux clients to an Active Directory domain.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation
active-directory windows-server domain-controller authentication identity-management dns adds windows directory-services

LDAP Authentication Setup Guide

Learn how to set up centralised LDAP authentication between an OpenLDAP server and Linux clients using nslcd and PAM for enterprise identity management.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation
ldap authentication identity-management openldap nslcd pam directory-services phpldapadmin linux

Network Authentication and Directory Services

Introduction to centralised authentication, directory services, and identity management using Active Directory and LDAP in enterprise environments.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AAA: Authentication AAA: Authorisation NS: Network Security
active-directory ldap authentication identity-management directory-services domain-controller enterprise-security authorisation

Introducing Web Security: Web and Local Proxy Fundamentals

Learn web security fundamentals through hands-on exercises including HTTP client-server interactions, web server simulation with netcat, dynamic PHP pages, and security testing with OWASP ZAP proxy.

Authors: Z. Cliffe Schreuders, Andrew Scholey, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Detection of Vulnerabilities
web-security http php zap proxy fuzzing owasp

Web Security: Sessions and Cookies

Learn about web security sessions and cookies through hands-on exercises using DVWA, OWASP WebGoat, and Security Shepherd. Understand cookie mechanisms, session management, and security vulnerabilities.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Detection of Vulnerabilities
web-security sessions cookies dvwa zap owasp

Web Security: Cross-Site Scripting

Learn about Cross-Site Scripting (XSS) attacks through hands-on exercises using DVWA, WebGoat, and Security Shepherd. Understand reflected, stored, and DOM-based XSS vulnerabilities and their mitigation.

Authors: Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security xss cross-site-scripting dvwa webgoat security-shepherd

Web Security: SQL Injection

Learn about SQL injection attacks through hands-on exercises using DVWA, OWASP WebGoat, and Security Shepherd. Understand SQL injection vulnerabilities, blind SQL injection, and mitigation strategies.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security sql-injection dvwa webgoat security-shepherd blind-sql-injection

Web Security: Advanced Injection

Learn about advanced injection attacks including OS command injection and automated SQL injection using sqlmap. Understand command injection vulnerabilities and automated penetration testing tools.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security sql-injection command-injection sqlmap dvwa webgoat security-shepherd

Cross-Site Request Forgery

Learn about Cross-Site Request Forgery (CSRF) attacks through hands-on exercises using DVWA, OWASP WebGoat and WebWolf, and Security Shepherd. Understand CSRF vulnerabilities, CORS limitations, and practical skills in executing and defending against such attacks.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security csrf dvwa webgoat webwolf security-shepherd

Web Security: Additional Challenges

Complete additional web security challenges using Security Shepherd platform, focusing on cryptographic storage vulnerabilities and unvalidated redirects.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches WAM: Client-Side Vulnerabilities and Mitigations WAM: Server-Side Vulnerabilities and Mitigations SS: Categories of Vulnerabilities SS: Prevention of Vulnerabilities SS: Detection of Vulnerabilities
web-security cryptographic-storage redirects security-shepherd ctf

Network Security: Labtainers Network Labs

Learn network security fundamentals through hands-on Labtainers exercises including packet analysis with Wireshark and Tshark, firewall configuration with iptables, and VPN implementation using OpenVPN.

Authors: Thalita Vergilio, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: Monitor: Data Sources F: Main Memory Forensics NS: Network Defence Tools NS: Internet Architecture WAM: FIREWALLS
network-security packet-analysis wireshark iptables vpn openvpn labtainers

About

These lab sheets are designed to provide practical, hands-on experience with various cybersecurity concepts and techniques.

These labs are written to be completed on VMs configured with practical hacking/security challenges.

Visit Hacktivity Cyber Security Labs for a fully configured, cloud-based lab environment

Option 2: Manual Setup with SecGen

For advanced users who want to build their own lab environment:

Contributing

If you’d like to contribute new labs or improvements to existing ones, please see the repository’s contribution guidelines.