Hacktivity Lab Sheets

Welcome to the Hacktivity SecGen lab sheets repository. This site contains hands-on cybersecurity lab exercises designed for educational purposes.

Available Labs

Cyber security landscape

Human Factors and Social Engineering: Phishing

Learn about human factors in cybersecurity through hands-on phishing simulation. Practice social engineering techniques, email spoofing, and creating malicious attachments to understand how attackers exploit human psychology.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: HF: Human Error AB: Attacks MAT: Attacks and exploitation WAM: Client-Side Vulnerabilities and Mitigations
phishing social-engineering email-security human-factors malware macros

Introduction to Cryptography: Encoding and Encryption

Learn essential cryptography concepts through hands-on practice with encoding schemes, hash algorithms, OpenSSL, and GPG. Master data encoding, symmetric and asymmetric encryption, and key management.

Authors: Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AC: Algorithms, Schemes and Protocols F: Artifact Analysis WAM: Fundamental Concepts and Approaches
cryptography encoding encryption openssl gpg base64 aes des

Documentation

Lab Sheet Highlighting Guide (AI Instructions)

A comprehensive guide for AI assistants on how to properly highlight lab sheets using the new highlighting system. This guide contains examples and instructions for converting plain text lab sheets into properly highlighted versions.

Author: AI Assistant
License: CC BY-SA 4.0
ai-guide highlighting lab-formatting documentation

Introducing attacks

Introduction to Linux and Security

Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: NS: Network Protocols and Vulnerability SOIM: PENETRATION TESTING
linux command-line ssh kali networking security

Malware and an Introduction to Metasploit and Payloads

Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, Abi Yusuf, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis MAT: Attacks and exploitation SOIM: PENETRATION TESTING
malware metasploit payloads trojan ethical-hacking penetration-testing

Vulnerabilities, Exploits, and Remote Access Payloads

Learn about software vulnerabilities, exploits, and payloads including bind shells, reverse shells, and Metasploit framework usage for penetration testing. This lab covers practical exploitation techniques using real-world examples like Adobe Reader vulnerabilities and Distcc remote code execution.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Attacks and exploitation SOIM: PENETRATION TESTING
vulnerabilities exploits payloads metasploit bind-shell reverse-shell penetration-testing

Information Gathering: Scanning

Learn network scanning techniques including ping sweeps, port scanning, service identification, and OS detection using tools like Nmap and custom bash scripts. This lab covers reconnaissance and network mapping for penetration testing.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware NS: PENETRATION TESTING SOIM: PENETRATION TESTING
scanning nmap reconnaissance network-mapping penetration-testing ping-sweeps port-scanning

From Scanning to Exploitation

Learn hands-on scanning and exploitation techniques, including network scanning with Nmap, using Metasploit and Armitage for exploitation, and searching vulnerability databases to gain control of target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Tom Shaw, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware SS: Categories of Vulnerabilities MAT: Attacks and exploitation SOIM: PENETRATION TESTING
exploitation metasploit nmap armitage vulnerability scanning

Post-exploitation

Learn post-exploitation techniques including privilege escalation, information gathering, password hash collection, and advanced payloads like Meterpreter for maintaining access and pivoting through compromised systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware MAT: Attacks and exploitation SOIM: PENETRATION TESTING
post-exploitation metasploit meterpreter privilege-escalation pivoting keylogging armitage

Vulnerability Analysis

Learn vulnerability assessment techniques using industry-standard tools like Nmap NSE, Nessus, and Nikto to identify security weaknesses in target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: PENETRATION TESTING MAT: Attacks and exploitation
vulnerability-assessment nmap nessus nikto security-scanning penetration-testing

Feeling Blu Challenge - Web Security CTF

A comprehensive CTF challenge focusing on web security, penetration testing, and privilege escalation. Exploit vulnerabilities in a web server to gain access and achieve root access.

Authors: Anatoliy Gorbenko, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches AAA: Authentication WAM: Server-Side Vulnerabilities and Mitigations MAT: Attacks and exploitation SS: Categories of Vulnerabilities SOIM: PENETRATION TESTING AAA: Authorisation OSV: Primitives for Isolation and Mediation AB: Models MAT: Malicious Activities by Malware AC: Symmetric Cryptography
ctf web-security penetration-testing privilege-escalation metasploit owasp-zap

Software and malware analysis

Anti-Reverse-Engineering

Advanced anti-reverse-engineering techniques including anti-debugging, anti-disassembly, and code obfuscation methods used by malware to thwart analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
anti-reverse-engineering anti-debugging anti-disassembly code-obfuscation malware-analysis ctf

Malware Behaviour - Reverse Engineering and Analysis of the Coconut Malware Sample

Advanced malware analysis lab using Hackerbot to analyze the Coconut malware sample, including packer identification, network analysis, backdoor detection, and YARA rule creation.

Authors: Tom Shaw, Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
malware-analysis reverse-engineering hackerbot coconut backdoor yara network-analysis ctf

Introduction to Dynamic and Static Analysis

Learn fundamental malware analysis techniques including static and dynamic analysis of binary executables, and reverse engineering.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis reverse-engineering static-analysis dynamic-analysis ctf binary-analysis

Introduction to C Programming

Learn fundamental C programming concepts including data types, arrays, strings, conditionals, loops, functions, and pointers for malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Technical Underpinning
c-programming low-level-programming memory-management pointers malware-analysis reverse-engineering

From C to Assembly Language

Learn C programming concepts including structs, memory management, bitwise operators, and assembly language for 32-bit x86 processors. Practice reverse engineering and low-level programming skills.

Authors: Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis MAT: Technical Underpinning
c-programming assembly memory-management bitwise-operators reverse-engineering low-level-programming

Recognising C Code Constructs in Assembly

Learn to recognize C code constructs in assembly language including branching, conditionals, loops, switch statements, arrays, strings, and structs for reverse engineering and malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
assembly reverse-engineering malware-analysis c-programming low-level-programming

Ghidra Software Reverse Engineering (SRE)

Learn software reverse engineering using Ghidra, including ELF file structure, disassembly, decompilation, and CTF challenges for malware analysis.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
ghidra reverse-engineering elf disassembly decompilation malware-analysis ctf

Dynamic Analysis and Debugging

Learn dynamic malware analysis using GDB debugger, including breakpoints, memory examination, register analysis, and CTF challenges for runtime behavior analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging malware-analysis breakpoints memory-analysis ctf

Debugging Continued

Advanced dynamic analysis using GDB debugger with 8 challenging CTF exercises covering XOR encryption, memory analysis, register examination, and advanced debugging techniques.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging advanced ctf xor memory-analysis register-analysis

Malware Behaviour: Flag Hints

Advanced malware behavior analysis using dynamic reverse engineering techniques including process forking, network communication, library preloading, and binary unpacking.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis dynamic-analysis process-forking network-analysis library-preloading binary-unpacking ctf

General Labs

Human Factors and Social Engineering: Phishing

Learn about human factors in cybersecurity through hands-on phishing simulation. Practice social engineering techniques, email spoofing, and creating malicious attachments to understand how attackers exploit human psychology.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: HF: Human Error AB: Attacks MAT: Attacks and exploitation WAM: Client-Side Vulnerabilities and Mitigations
phishing social-engineering email-security human-factors malware macros

Introduction to Cryptography: Encoding and Encryption

Learn essential cryptography concepts through hands-on practice with encoding schemes, hash algorithms, OpenSSL, and GPG. Master data encoding, symmetric and asymmetric encryption, and key management.

Authors: Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AC: Algorithms, Schemes and Protocols F: Artifact Analysis WAM: Fundamental Concepts and Approaches
cryptography encoding encryption openssl gpg base64 aes des

Lab Sheet Highlighting Guide (AI Instructions)

A comprehensive guide for AI assistants on how to properly highlight lab sheets using the new highlighting system. This guide contains examples and instructions for converting plain text lab sheets into properly highlighted versions.

Author: AI Assistant
License: CC BY-SA 4.0
ai-guide highlighting lab-formatting documentation

Introduction to Linux and Security

Learn Linux fundamentals and security tools, including command-line operations, file system navigation, SSH, and basic penetration testing with Kali Linux.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: NS: Network Protocols and Vulnerability SOIM: PENETRATION TESTING
linux command-line ssh kali networking security

Malware and an Introduction to Metasploit and Payloads

Explore malware types and ethical hacking techniques using the Metasploit framework. Learn to create Trojan horses, evade anti-malware detection, and generate payloads in a controlled environment.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Thalita Vergilio, Abi Yusuf, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis MAT: Attacks and exploitation SOIM: PENETRATION TESTING
malware metasploit payloads trojan ethical-hacking penetration-testing

Vulnerabilities, Exploits, and Remote Access Payloads

Learn about software vulnerabilities, exploits, and payloads including bind shells, reverse shells, and Metasploit framework usage for penetration testing. This lab covers practical exploitation techniques using real-world examples like Adobe Reader vulnerabilities and Distcc remote code execution.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Attacks and exploitation SOIM: PENETRATION TESTING
vulnerabilities exploits payloads metasploit bind-shell reverse-shell penetration-testing

Information Gathering: Scanning

Learn network scanning techniques including ping sweeps, port scanning, service identification, and OS detection using tools like Nmap and custom bash scripts. This lab covers reconnaissance and network mapping for penetration testing.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware NS: PENETRATION TESTING SOIM: PENETRATION TESTING
scanning nmap reconnaissance network-mapping penetration-testing ping-sweeps port-scanning

From Scanning to Exploitation

Learn hands-on scanning and exploitation techniques, including network scanning with Nmap, using Metasploit and Armitage for exploitation, and searching vulnerability databases to gain control of target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, Tom Shaw, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware SS: Categories of Vulnerabilities MAT: Attacks and exploitation SOIM: PENETRATION TESTING
exploitation metasploit nmap armitage vulnerability scanning

Post-exploitation

Learn post-exploitation techniques including privilege escalation, information gathering, password hash collection, and advanced payloads like Meterpreter for maintaining access and pivoting through compromised systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: AB: Models MAT: Malicious Activities by Malware MAT: Attacks and exploitation SOIM: PENETRATION TESTING
post-exploitation metasploit meterpreter privilege-escalation pivoting keylogging armitage

Vulnerability Analysis

Learn vulnerability assessment techniques using industry-standard tools like Nmap NSE, Nessus, and Nikto to identify security weaknesses in target systems.

Authors: Z. Cliffe Schreuders, Anatoliy Gorbenko, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: SOIM: PENETRATION TESTING MAT: Attacks and exploitation
vulnerability-assessment nmap nessus nikto security-scanning penetration-testing

Feeling Blu Challenge - Web Security CTF

A comprehensive CTF challenge focusing on web security, penetration testing, and privilege escalation. Exploit vulnerabilities in a web server to gain access and achieve root access.

Authors: Anatoliy Gorbenko, Z. Cliffe Schreuders, and Andrew Scholey
License: CC BY-SA 4.0
CyBOK Knowledge Areas: WAM: Fundamental Concepts and Approaches AAA: Authentication WAM: Server-Side Vulnerabilities and Mitigations MAT: Attacks and exploitation SS: Categories of Vulnerabilities SOIM: PENETRATION TESTING AAA: Authorisation OSV: Primitives for Isolation and Mediation AB: Models MAT: Malicious Activities by Malware AC: Symmetric Cryptography
ctf web-security penetration-testing privilege-escalation metasploit owasp-zap

Anti-Reverse-Engineering

Advanced anti-reverse-engineering techniques including anti-debugging, anti-disassembly, and code obfuscation methods used by malware to thwart analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
anti-reverse-engineering anti-debugging anti-disassembly code-obfuscation malware-analysis ctf

Malware Behaviour - Reverse Engineering and Analysis of the Coconut Malware Sample

Advanced malware analysis lab using Hackerbot to analyze the Coconut malware sample, including packer identification, network analysis, backdoor detection, and YARA rule creation.

Authors: Tom Shaw, Mo Hassan, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
malware-analysis reverse-engineering hackerbot coconut backdoor yara network-analysis ctf

Introduction to Dynamic and Static Analysis

Learn fundamental malware analysis techniques including static and dynamic analysis of binary executables, and reverse engineering.

Authors: Z. Cliffe Schreuders, and Tom Shaw
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis reverse-engineering static-analysis dynamic-analysis ctf binary-analysis

Introduction to C Programming

Learn fundamental C programming concepts including data types, arrays, strings, conditionals, loops, functions, and pointers for malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Technical Underpinning
c-programming low-level-programming memory-management pointers malware-analysis reverse-engineering

From C to Assembly Language

Learn C programming concepts including structs, memory management, bitwise operators, and assembly language for 32-bit x86 processors. Practice reverse engineering and low-level programming skills.

Authors: Thalita Vergilio
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis MAT: Technical Underpinning
c-programming assembly memory-management bitwise-operators reverse-engineering low-level-programming

Recognising C Code Constructs in Assembly

Learn to recognize C code constructs in assembly language including branching, conditionals, loops, switch statements, arrays, strings, and structs for reverse engineering and malware analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
assembly reverse-engineering malware-analysis c-programming low-level-programming

Ghidra Software Reverse Engineering (SRE)

Learn software reverse engineering using Ghidra, including ELF file structure, disassembly, decompilation, and CTF challenges for malware analysis.

Authors: Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
ghidra reverse-engineering elf disassembly decompilation malware-analysis ctf

Dynamic Analysis and Debugging

Learn dynamic malware analysis using GDB debugger, including breakpoints, memory examination, register analysis, and CTF challenges for runtime behavior analysis.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging malware-analysis breakpoints memory-analysis ctf

Debugging Continued

Advanced dynamic analysis using GDB debugger with 8 challenging CTF exercises covering XOR encryption, memory analysis, register examination, and advanced debugging techniques.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Analysis
gdb dynamic-analysis debugging advanced ctf xor memory-analysis register-analysis

Malware Behaviour: Flag Hints

Advanced malware behavior analysis using dynamic reverse engineering techniques including process forking, network communication, library preloading, and binary unpacking.

Authors: Thalita Vergilio, Tom Shaw, and Z. Cliffe Schreuders
License: CC BY-SA 4.0
CyBOK Knowledge Areas: MAT: Malware Taxonomy MAT: Malware Analysis
malware-analysis dynamic-analysis process-forking network-analysis library-preloading binary-unpacking ctf

About

These lab sheets are designed to provide practical, hands-on experience with various cybersecurity concepts and techniques.

These labs are written to be completed on VMs configured with practical hacking/security challenges.

Visit Hacktivity Cyber Security Labs for a fully configured, cloud-based lab environment

Option 2: Manual Setup with SecGen

For advanced users who want to build their own lab environment:

Contributing

If you’d like to contribute new labs or improvements to existing ones, please see the repository’s contribution guidelines.