Skip to content

Latest commit

 

History

History
3221 lines (2033 loc) · 139 KB

README-CyBOK-Scenarios-Indexed.md

File metadata and controls

3221 lines (2033 loc) · 139 KB

Lab Scenarios and CyBOK

The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video lectures for scenarios are tagged with CyBOK associations.

This file is an autogenerated index and cross referencing of the 104 SecGen lab scenarios that have CyBOK metadata.

You can browse the list below in terms of the CyBOK Knowledge Areas, and Topics. The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).

The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the CyBOK mapping reference, mixed case keywords are ones that we have added.

Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.

Scenarios Indexed By CyBOK Knowledge Area (KA)

Network Security (NS)
Security Operations & Incident Management (SOIM)
Malware & Attack Technology (MAT)
Adversarial Behaviours (AB)
Software Security (SS)
Authentication, Authorisation & Accountability (AAA)
Operating Systems & Virtualisation (OSV)
Forensics (F)
Cyber-Physical Systems Security (CPS)
Web & Mobile Security (WAM)
Cryptography (C)

Network Security (NS)

NS Scenarios

introducing_attacks/1_intro_linux.xml
introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
labtainers/arp-spoof.xml
labtainers/denyhost.xml
labtainers/dmz-example.xml
labtainers/dmz-lab.xml
labtainers/grfics.xml
labtainers/iptables-ics.xml
labtainers/iptables.xml
labtainers/iptables2.xml
labtainers/local-dns.xml
labtainers/nix-commands.xml
labtainers/nmap-discovery.xml
labtainers/nmap-ssh.xml
labtainers/pcapanalysis.xml
labtainers/pubkey.xml
labtainers/radius.xml
labtainers/remote-dns.xml
labtainers/routing-basics.xml
labtainers/routing-basics2.xml
labtainers/snort.xml
labtainers/tcpip.xml
labtainers/telnetlab.xml
labtainers/vpnlab.xml
labtainers/vpnlab2.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/6_exfiltration_detection.xml

NS Scenarios by Topics

Topic Scenario
Network Protocols and Vulnerability introducing_attacks/1_intro_linux.xml
labtainers/arp-spoof.xml
labtainers/local-dns.xml
labtainers/remote-dns.xml
labtainers/tcpip.xml
PENETRATION TESTING introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
labtainers/nix-commands.xml
labtainers/nmap-discovery.xml
labtainers/nmap-ssh.xml
Network Defence Tools labtainers/denyhost.xml
labtainers/dmz-example.xml
labtainers/dmz-lab.xml
labtainers/grfics.xml
labtainers/iptables-ics.xml
labtainers/iptables.xml
labtainers/iptables2.xml
labtainers/snort.xml
labtainers/vpnlab.xml
labtainers/vpnlab2.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/6_exfiltration_detection.xml
Internet Architecture labtainers/iptables-ics.xml
labtainers/iptables.xml
labtainers/iptables2.xml
labtainers/pubkey.xml
labtainers/radius.xml
labtainers/routing-basics.xml
labtainers/routing-basics2.xml
labtainers/tcpip.xml
OSI (OPEN SYSTEM INTERCONNECT) MODEL labtainers/pcapanalysis.xml
REMOTE ACCESS labtainers/telnetlab.xml
TCP/IP labtainers/telnetlab.xml

Security Operations & Incident Management (SOIM)

SOIM Scenarios

introducing_attacks/1_intro_linux.xml
introducing_attacks/2_malware_msf_payloads.xml
introducing_attacks/3_vulnerabilities.xml
introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
introducing_attacks/8_vulnerability_analysis.xml
labtainers/arp-spoof.xml
labtainers/backups.xml
labtainers/backups2.xml
labtainers/capabilities.xml
labtainers/centos-log.xml
labtainers/centos-log2.xml
labtainers/denyhost.xml
labtainers/file-integrity.xml
labtainers/grassmarlin.xml
labtainers/ldap.xml
labtainers/metasploit.xml
labtainers/nmap-ssh.xml
labtainers/packet-introspection.xml
labtainers/pcapanalysis.xml
labtainers/snort.xml
labtainers/sys-log.xml
labtainers/wireshark-intro.xml
response_and_investigation/2_integrity_detection.xml
response_and_investigation/3_backups_and_recovery.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/6_exfiltration_detection.xml

SOIM Scenarios by Topics

Topic Scenario
PENETRATION TESTING introducing_attacks/1_intro_linux.xml
introducing_attacks/2_malware_msf_payloads.xml
introducing_attacks/3_vulnerabilities.xml
introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
introducing_attacks/8_vulnerability_analysis.xml
labtainers/metasploit.xml
Monitor: Data Sources labtainers/arp-spoof.xml
labtainers/capabilities.xml
labtainers/centos-log.xml
labtainers/centos-log2.xml
labtainers/file-integrity.xml
labtainers/grassmarlin.xml
labtainers/ldap.xml
labtainers/packet-introspection.xml
labtainers/pcapanalysis.xml
labtainers/snort.xml
labtainers/sys-log.xml
labtainers/wireshark-intro.xml
response_and_investigation/2_integrity_detection.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/6_exfiltration_detection.xml
Execute: Mitigation and Countermeasures labtainers/backups.xml
labtainers/backups2.xml
labtainers/denyhost.xml
labtainers/snort.xml
response_and_investigation/3_backups_and_recovery.xml
response_and_investigation/4_ids.xml
INCIDENT RESPONSE labtainers/backups.xml
labtainers/backups2.xml
CM (CONFIGURATION MANAGEMENT) labtainers/denyhost.xml
labtainers/nmap-ssh.xml
Analyse: Analysis Methods labtainers/snort.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/6_exfiltration_detection.xml

Malware & Attack Technology (MAT)

MAT Scenarios

introducing_attacks/2_malware_msf_payloads.xml
introducing_attacks/3_vulnerabilities.xml
introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
introducing_attacks/8_vulnerability_analysis.xml
labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
labtainers/bufoverflow.xml
labtainers/formatstring.xml
labtainers/gdblesson.xml
labtainers/ida.xml
labtainers/metasploit.xml
labtainers/retlibc.xml
labtainers/snort.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/7_live_analysis.xml
response_and_investigation/8_dead_analysis.xml
software_and_malware_analysis/10_anti_sre.xml
software_and_malware_analysis/1_dynamic_and_static_analysis.xml
software_and_malware_analysis/2_intro_to_c.xml
software_and_malware_analysis/3_c_and_asm.xml
software_and_malware_analysis/4_asm.xml
software_and_malware_analysis/5_ghidra.xml
software_and_malware_analysis/6_ghidra_analysis.xml
software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
software_and_malware_analysis/7_dynamic.xml
software_and_malware_analysis/8_dynamic_continued.xml
software_and_malware_analysis/9_malware_behaviour.xml
software_security_exploitation/4_exploit_development.xml
software_security_exploitation/5_linux_stack_bof.xml
software_security_exploitation/6_linux_nx_bypass.xml
software_security_exploitation/7_linux_aslr_bypass.xml
software_security_exploitation/8_linux_bof_format.xml

MAT Scenarios by Topics

Topic Scenario
Malware Taxonomy introducing_attacks/2_malware_msf_payloads.xml
software_and_malware_analysis/1_dynamic_and_static_analysis.xml
software_and_malware_analysis/9_malware_behaviour.xml
Malware Analysis introducing_attacks/2_malware_msf_payloads.xml
labtainers/gdblesson.xml
labtainers/ida.xml
software_and_malware_analysis/10_anti_sre.xml
software_and_malware_analysis/1_dynamic_and_static_analysis.xml
software_and_malware_analysis/3_c_and_asm.xml
software_and_malware_analysis/4_asm.xml
software_and_malware_analysis/5_ghidra.xml
software_and_malware_analysis/6_ghidra_analysis.xml
software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
software_and_malware_analysis/7_dynamic.xml
software_and_malware_analysis/8_dynamic_continued.xml
software_and_malware_analysis/9_malware_behaviour.xml
Attacks and exploitation introducing_attacks/2_malware_msf_payloads.xml
introducing_attacks/3_vulnerabilities.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
introducing_attacks/8_vulnerability_analysis.xml
labtainers/bufoverflow.xml
labtainers/formatstring.xml
labtainers/metasploit.xml
labtainers/retlibc.xml
software_security_exploitation/4_exploit_development.xml
software_security_exploitation/5_linux_stack_bof.xml
software_security_exploitation/6_linux_nx_bypass.xml
software_security_exploitation/7_linux_aslr_bypass.xml
software_security_exploitation/8_linux_bof_format.xml
Malicious Activities by Malware introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
labtainers/metasploit.xml
MALCODE/MALWARE labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
Malware Detection labtainers/snort.xml
response_and_investigation/4_ids.xml
response_and_investigation/5_ids_rules.xml
response_and_investigation/7_live_analysis.xml
response_and_investigation/8_dead_analysis.xml
Technical Underpinning software_and_malware_analysis/2_intro_to_c.xml
software_and_malware_analysis/3_c_and_asm.xml

Adversarial Behaviours (AB)

AB Scenarios

introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
labtainers/grfics.xml

AB Scenarios by Topics

Topic Scenario
Models introducing_attacks/4_dns_footprinting.xml
introducing_attacks/5_scanning.xml
introducing_attacks/6_exploitation.xml
introducing_attacks/7_post-exploitation.xml
labtainers/grfics.xml

Software Security (SS)

SS Scenarios

introducing_attacks/6_exploitation.xml
labtainers/bufoverflow.xml
labtainers/formatstring.xml
labtainers/pass-crack.xml
labtainers/retlibc.xml
labtainers/sql-inject.xml
labtainers/xforge.xml
labtainers/xsite.xml
software_security_exploitation/1_c_asm_iof.xml
software_security_exploitation/2_race_conditions_format_str.xml
software_security_exploitation/3_bug_hunting_and_fuzzing.xml
software_security_exploitation/4_exploit_development.xml
software_security_exploitation/5_linux_stack_bof.xml
software_security_exploitation/6_linux_nx_bypass.xml
software_security_exploitation/7_linux_aslr_bypass.xml
software_security_exploitation/8_linux_bof_format.xml
systems_security/8_apparmor.xml
web_security/websec_lab.xml

SS Scenarios by Topics

Topic Scenario
Categories of Vulnerabilities introducing_attacks/6_exploitation.xml
labtainers/bufoverflow.xml
labtainers/formatstring.xml
labtainers/retlibc.xml
labtainers/sql-inject.xml
software_security_exploitation/1_c_asm_iof.xml
software_security_exploitation/2_race_conditions_format_str.xml
software_security_exploitation/4_exploit_development.xml
software_security_exploitation/5_linux_stack_bof.xml
software_security_exploitation/6_linux_nx_bypass.xml
software_security_exploitation/7_linux_aslr_bypass.xml
software_security_exploitation/8_linux_bof_format.xml
web_security/websec_lab.xml
Mitigating Exploitation labtainers/bufoverflow.xml
labtainers/retlibc.xml
software_security_exploitation/6_linux_nx_bypass.xml
software_security_exploitation/7_linux_aslr_bypass.xml
systems_security/8_apparmor.xml
Authentication labtainers/pass-crack.xml
Prevention of Vulnerabilities labtainers/sql-inject.xml
labtainers/xforge.xml
labtainers/xsite.xml
software_security_exploitation/1_c_asm_iof.xml
software_security_exploitation/2_race_conditions_format_str.xml
web_security/websec_lab.xml
Detection of Vulnerabilities software_security_exploitation/3_bug_hunting_and_fuzzing.xml

Authentication, Authorisation & Accountability (AAA)

AAA Scenarios

labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
labtainers/file-integrity.xml
labtainers/ldap.xml
labtainers/macs-hash.xml
labtainers/nix-commands.xml
labtainers/onewayhash.xml
labtainers/radius.xml
labtainers/setuid-env.xml
response_and_investigation/1_integrity_protection.xml
response_and_investigation/7_live_analysis.xml
response_and_investigation/8_dead_analysis.xml
systems_security/1_authentication.xml
systems_security/2_pam.xml
systems_security/4_access_controls.xml
systems_security/5_suid.xml
systems_security/6_facls.xml
systems_security/7_containers.xml
systems_security/8_apparmor.xml

AAA Scenarios by Topics

Topic Scenario
Authorisation labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
labtainers/ldap.xml
labtainers/nix-commands.xml
labtainers/setuid-env.xml
response_and_investigation/1_integrity_protection.xml
systems_security/4_access_controls.xml
systems_security/5_suid.xml
systems_security/6_facls.xml
systems_security/7_containers.xml
systems_security/8_apparmor.xml
Authentication labtainers/file-integrity.xml
labtainers/ldap.xml
labtainers/macs-hash.xml
labtainers/onewayhash.xml
labtainers/radius.xml
systems_security/1_authentication.xml
systems_security/2_pam.xml
Accountability response_and_investigation/7_live_analysis.xml
response_and_investigation/8_dead_analysis.xml

Operating Systems & Virtualisation (OSV)

OSV Scenarios

labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
labtainers/capabilities.xml
labtainers/setuid-env.xml
response_and_investigation/1_integrity_protection.xml
response_and_investigation/2_integrity_detection.xml
response_and_investigation/7_live_analysis.xml
systems_security/1_authentication.xml
systems_security/2_pam.xml
systems_security/4_access_controls.xml
systems_security/5_suid.xml
systems_security/6_facls.xml
systems_security/7_containers.xml
systems_security/8_apparmor.xml

OSV Scenarios by Topics

Topic Scenario
Primitives for Isolation and Mediation labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
labtainers/capabilities.xml
labtainers/setuid-env.xml
response_and_investigation/1_integrity_protection.xml
systems_security/1_authentication.xml
systems_security/2_pam.xml
systems_security/4_access_controls.xml
systems_security/5_suid.xml
systems_security/6_facls.xml
systems_security/7_containers.xml
systems_security/8_apparmor.xml
Role of Operating Systems labtainers/acl-hackerbot-flags.xml
labtainers/acl.xml
systems_security/4_access_controls.xml
systems_security/7_containers.xml
OS Hardening response_and_investigation/2_integrity_detection.xml
response_and_investigation/7_live_analysis.xml

Forensics (F)

F Scenarios

labtainers/file-deletion.xml
labtainers/file-integrity.xml
labtainers/macs-hash.xml
labtainers/onewayhash.xml
labtainers/packet-introspection.xml
labtainers/pass-crack.xml
labtainers/pcapanalysis.xml
labtainers/webtrack.xml
response_and_investigation/2_integrity_detection.xml
response_and_investigation/6_exfiltration_detection.xml
response_and_investigation/7_live_analysis.xml
response_and_investigation/8_dead_analysis.xml

F Scenarios by Topics

Topic Scenario
Operating System Analysis labtainers/file-deletion.xml
labtainers/file-integrity.xml
response_and_investigation/8_dead_analysis.xml
Artifact Analysis labtainers/macs-hash.xml
labtainers/onewayhash.xml
labtainers/pass-crack.xml
response_and_investigation/2_integrity_detection.xml
response_and_investigation/6_exfiltration_detection.xml
Main Memory Forensics labtainers/packet-introspection.xml
labtainers/pcapanalysis.xml
response_and_investigation/7_live_analysis.xml
WEB labtainers/webtrack.xml

Cyber-Physical Systems Security (CPS)

CPS Scenarios

labtainers/grassmarlin.xml
labtainers/grfics.xml
labtainers/iptables-ics.xml
labtainers/plc-app.xml
labtainers/plc-forensics-adv.xml
labtainers/plc-forensics.xml
labtainers/plc.xml
labtainers/softplc.xml
labtainers/softplc2.xml
labtainers/ssl.xml

CPS Scenarios by Topics

Topic Scenario
Cyber-Physical Systems labtainers/grassmarlin.xml
labtainers/grfics.xml
labtainers/iptables-ics.xml
labtainers/plc-app.xml
labtainers/plc-forensics-adv.xml
labtainers/plc-forensics.xml
labtainers/plc.xml
labtainers/softplc.xml
labtainers/softplc2.xml
labtainers/ssl.xml
Cyber-Physical Systems Domains labtainers/grassmarlin.xml
labtainers/grfics.xml
labtainers/iptables-ics.xml
labtainers/plc-app.xml
labtainers/plc-forensics-adv.xml
labtainers/plc-forensics.xml
labtainers/plc.xml
labtainers/softplc.xml
labtainers/softplc2.xml
labtainers/ssl.xml

Web & Mobile Security (WAM)

WAM Scenarios

labtainers/iptables-ics.xml
labtainers/iptables.xml
labtainers/iptables2.xml
labtainers/sql-inject.xml
labtainers/webtrack.xml
labtainers/xforge.xml
labtainers/xsite.xml
systems_security/7_containers.xml
web_security/websec_lab.xml

WAM Scenarios by Topics

Topic Scenario
FIREWALLS labtainers/iptables-ics.xml
labtainers/iptables.xml
labtainers/iptables2.xml
Server-Side Vulnerabilities and Mitigations labtainers/sql-inject.xml
labtainers/xforge.xml
labtainers/xsite.xml
web_security/websec_lab.xml
Fundamental Concepts and Approaches labtainers/webtrack.xml
systems_security/7_containers.xml
web_security/websec_lab.xml
Client-Side Vulnerabilities and Mitigations web_security/websec_lab.xml

Cryptography (C)

C Scenarios

labtainers/macs-hash.xml
labtainers/onewayhash.xml
labtainers/pubkey.xml
labtainers/ssh-agent.xml
labtainers/sshlab.xml
labtainers/ssl.xml
labtainers/symkeylab.xml

C Scenarios by Topics

Topic Scenario
Public-Key Cryptography labtainers/macs-hash.xml
labtainers/onewayhash.xml
labtainers/ssh-agent.xml
labtainers/sshlab.xml
labtainers/ssl.xml
Schemes labtainers/pubkey.xml
labtainers/symkeylab.xml
Symmetric Cryptography labtainers/symkeylab.xml

Scenario CyBOK Keywords

introducing_attacks/1_intro_linux.xml

Details

Key Data
Name Introduction to Linux and Security lab
Description
Introduction
This topic covers lots of ground regarding fundamentals of Linux and free open source software (FOSS).

Lecture
Slides here

Reading
Chapters 1 "Introduction" and 2 "Unix History and Lineage": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Suggested:

Chapter 1 "An Overview of Computer Security": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability common network attacks
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/1_intro_linux.xml run

View source

introducing_attacks/2_malware_msf_payloads.xml

Details

Key Data
Name Malware and an Introduction to Metasploit and Payloads
Description
Introduction
This week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program.

Lecture
Slides here

Reading
Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library

Suggested:

Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779)

Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
Lab
Lab sheet here.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds
Malware & Attack Technology (MAT) Malware Analysis anti-analysis and evasion techniques
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION FRAMEWORKS
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml run

View source

introducing_attacks/3_vulnerabilities.xml

Details

Key Data
Name Vulnerabilities, Exploits, and Remote Access Payloads
Description
Introduction
This week we will cover one of the major threats in computer security: software vulnerabilities. You will learn about the danger these pose, and start to learn about the power of the Metasploit framework, a popular hacking and penetration testing tool. You will learn and apply a number of important concepts such as payloads, shell code, bind and reverse shells, and both remote and local (client-side) exploits.

Lecture
Slides here

Reading
Chapter 8: Using Metasploit. Harper, A. and Harris, S. and Ness, J. and Eagle, C. and Lenkey, G, and Williams, T. (2011), Gray hat hacking : the ethical hacker's handbook, McGraw-Hill. (ISBN: 978-0-07-174256-6) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_victim; linux_victim_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/3_vulnerabilities.xml run

View source

introducing_attacks/4_dns_footprinting.xml

Details

Key Data
Name Information Gathering: Footprinting
Description
Introduction
The topic of information gathering spans two weeks, and covers practical steps that an attacker needs to take in order to attack a system, starting with footprinting (discovering systems to attack) and scanning (learning more about the systems such as what kinds of attacks they are vulnerable to).

Lecture
Slides here

Reading
Part I Casing the establishment. McClure, S. and Scambray, J. and Kurtz, G. (2009), Hacking exposed, McGraw-Hill. (ISBN: 978-0-07-161375-0) Available online via the library

Lab
Lab sheet here.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Adversarial Behaviours (AB) Models kill chains
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - DNS ZONE TRANSFER; EXPLOITATION FRAMEWORKS
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - RECONNAISSANCE; PENETRATION TESTING - SOFTWARE TOOLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/4_dns_footprinting.xml run

View source

introducing_attacks/5_scanning.xml

Details

Key Data
Name Information Gathering: Scanning
Description
Introduction
This week we learn how to scan networks to get an understanding of and to map out a network. Scanning is a critical stage for an attacker, since it can give them the information they need in order to launch an attack.

Reading
Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names linux_victim_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Adversarial Behaviours (AB) Models kill chains
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP; PENETRATION TESTING - NETWORK MAPPING - PING
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - RECONNAISSANCE; PENETRATION TESTING - SOFTWARE TOOLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/5_scanning.xml run

View source

introducing_attacks/6_exploitation.xml

Details

Key Data
Name From Scanning to Exploitation
Description
Introduction
This week we learn how we can scan networks to discover vulnerable services, and exploit them.

Reading
Chapter 2 Reconnaissance and Chapter 3 Scanning. Engebretson, P. (2011), The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Elsevier Inc. (ISBN: 978-1-59749-655-1) Available online via the library

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_server; linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Adversarial Behaviours (AB) Models kill chains
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain
Software Security (SS) Categories of Vulnerabilities CVEs and CWEs
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/6_exploitation.xml run

View source

introducing_attacks/7_post-exploitation.xml

Details

Key Data
Name Post-exploitation
Description
Introduction
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful.

Suggested reading
An excellent resource is Metasploit Unleashed.

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names windows_server; linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Adversarial Behaviours (AB) Models kill chains
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain; attack on confidentiality; integrity; availability
Malware & Attack Technology (MAT) Attacks and exploitation Post-exploitation: pivoting attacks; information gathering
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/7_post-exploitation.xml run

View source

introducing_attacks/8_vulnerability_analysis.xml

Details

Key Data
Name Vulnerability Analysis
Description
Introduction
It is important for organisations to manage the security of their systems and for security professionals to efficiently scan networks for vulnerabilities.

Lab
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names linux_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) PENETRATION TESTING VULNERABILITY ANALYSIS / VULNERABILITY SCANNING; AUDIT APPROACH; PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml run

View source

labtainers/acl-hackerbot-flags.xml

Details

Key Data
Name Labtainers lab: acl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations
Malware & Attack Technology (MAT) MALCODE/MALWARE trojan; backdoor; TROJANS - BACKDOOR
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Unix File Permissions; filesystems; inodes; and commands; umask
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Linux Extended Access Control Lists (facl)
Operating Systems & Virtualisation (OSV) Role of Operating Systems mediation

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/acl-hackerbot-flags.xml run

View source

labtainers/acl.xml

Details

Key Data
Name Labtainers lab: acl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations
Malware & Attack Technology (MAT) MALCODE/MALWARE trojan; backdoor; TROJANS - BACKDOOR
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Unix File Permissions; filesystems; inodes; and commands; umask
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Linux Extended Access Control Lists (facl)
Operating Systems & Virtualisation (OSV) Role of Operating Systems mediation

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/acl.xml run

View source

labtainers/arp-spoof.xml

Details

Key Data
Name Labtainers lab: arp-spoof
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; MITM (MAN-IN-THE-MIDDLE ATTACK); MAN-IN-THE-MIDDLE ATTACK (MITM); ATTACK(S) - ARP
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/arp-spoof.xml run

View source

labtainers/backups.xml

Details

Key Data
Name Labtainers lab: backups
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL
Security Operations & Incident Management (SOIM) INCIDENT RESPONSE RECOVERY - BACKUPS; RECOVERY; BACKUPS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/backups.xml run

View source

labtainers/backups2.xml

Details

Key Data
Name Labtainers lab: backups2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL
Security Operations & Incident Management (SOIM) INCIDENT RESPONSE RECOVERY - BACKUPS; RECOVERY; BACKUPS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/backups2.xml run

View source

labtainers/bufoverflow.xml

Details

Key Data
Name Labtainers lab: bufoverflow
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development
Software Security (SS) Mitigating Exploitation ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION); NON-EXECUTABLE MEMORY

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/bufoverflow.xml run

View source

labtainers/capabilities.xml

Details

Key Data
Name Labtainers lab: capabilities
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation capabilities; Rule-based controls: Course grained: Linux capabilities
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/capabilities.xml run

View source

labtainers/centos-log.xml

Details

Key Data
Name Labtainers lab: centos-log
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/centos-log.xml run

View source

labtainers/centos-log2.xml

Details

Key Data
Name Labtainers lab: centos-log2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/centos-log2.xml run

View source

labtainers/denyhost.xml

Details

Key Data
Name Labtainers lab: denyhost
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems; intrusion prevention systems
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures intrusion prevention systems
Security Operations & Incident Management (SOIM) CM (CONFIGURATION MANAGEMENT) SSH (SECURE SHELL)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/denyhost.xml run

View source

labtainers/dmz-example.xml

Details

Key Data
Name Labtainers lab: dmz-example
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools DEMILITARISED ZONE (DMZ)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/dmz-example.xml run

View source

labtainers/dmz-lab.xml

Details

Key Data
Name Labtainers lab: dmz-lab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools DEMILITARISED ZONE (DMZ)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/dmz-lab.xml run

View source

labtainers/file-deletion.xml

Details

Key Data
Name Labtainers lab: file-deletion
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Operating System Analysis storage forensics; data recovery and file content carving

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/file-deletion.xml run

View source

labtainers/file-integrity.xml

Details

Key Data
Name Labtainers lab: file-integrity
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication access control; Protecting integrity
Forensics (F) Operating System Analysis cryptographic hashing; storage forensics; data recovery and file content carving
Security Operations & Incident Management (SOIM) Monitor: Data Sources MONITORING - FILE INTEGRITY CHECKERS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/file-integrity.xml run

View source

labtainers/formatstring.xml

Details

Key Data
Name Labtainers lab: formatstring
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; Exploit development; Mitigation bypass: ASLR
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Format string attacks

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/formatstring.xml run

View source

labtainers/gdblesson.xml

Details

Key Data
Name Labtainers lab: gdblesson
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/gdblesson.xml run

View source

labtainers/grassmarlin.xml

Details

Key Data
Name Labtainers lab: grassmarlin
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems; SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA)
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/grassmarlin.xml run

View source

labtainers/grfics.xml

Details

Key Data
Name Labtainers lab: grfics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Adversarial Behaviours (AB) Models kill chains
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; protection against natural events and accidents; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems
Network Security (NS) Network Defence Tools intrusion detection systems; network architecture design

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/grfics.xml run

View source

labtainers/ida.xml

Details

Key Data
Name Labtainers lab: ida
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/ida.xml run

View source

labtainers/iptables-ics.xml

Details

Key Data
Name Labtainers lab: iptables-ics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems security and privacy concerns
Network Security (NS) Network Defence Tools FIREWALLS; IPTables
Network Security (NS) Internet Architecture network layer security
Web & Mobile Security (WAM) FIREWALLS FIREWALLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/iptables-ics.xml run

View source

labtainers/iptables.xml

Details

Key Data
Name Labtainers lab: iptables
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools FIREWALLS; IPTables
Network Security (NS) Internet Architecture network layer security
Web & Mobile Security (WAM) FIREWALLS FIREWALLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/iptables.xml run

View source

labtainers/iptables2.xml

Details

Key Data
Name Labtainers lab: iptables2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools FIREWALLS; IPTables
Network Security (NS) Internet Architecture network layer security
Web & Mobile Security (WAM) FIREWALLS FIREWALLS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/iptables2.xml run

View source

labtainers/ldap.xml

Details

Key Data
Name Labtainers lab: ldap
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; authentication in distributed systems
Authentication, Authorisation & Accountability (AAA) Authorisation AUTHORIZATION - LDAP (LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL)
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/ldap.xml run

View source

labtainers/local-dns.xml

Details

Key Data
Name Labtainers lab: local-dns
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/local-dns.xml run

View source

labtainers/macs-hash.xml

Details

Key Data
Name Labtainers lab: macs-hash
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)
Cryptography (C) Public-Key Cryptography symmetric encryption and authentication; MESSAGE AUTHENTICATION CODE (MAC); HASHED MESSAGE AUTHENTICATION CODE (HMAC)
Forensics (F) Artifact Analysis cryptographic hashing

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/macs-hash.xml run

View source

labtainers/metasploit.xml

Details

Key Data
Name Labtainers lab: metasploit
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malicious Activities by Malware cyber kill chain
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS
Security Operations & Incident Management (SOIM) PENETRATION TESTING PENETRATION TESTING - SOFTWARE TOOLS; PENETRATION TESTING - ACTIVE PENETRATION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/metasploit.xml run

View source

labtainers/nix-commands.xml

Details

Key Data
Name Labtainers lab: nix-commands
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - PING

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/nix-commands.xml run

View source

labtainers/nmap-discovery.xml

Details

Key Data
Name Labtainers lab: nmap-discovery
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/nmap-discovery.xml run

View source

labtainers/nmap-ssh.xml

Details

Key Data
Name Labtainers lab: nmap-ssh
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) PENETRATION TESTING PENETRATION TESTING - NETWORK MAPPING - FINGERPRINTING; PENETRATION TESTING - NETWORK MAPPING - NMAP
Security Operations & Incident Management (SOIM) CM (CONFIGURATION MANAGEMENT) SSH (SECURE SHELL)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/nmap-ssh.xml run

View source

labtainers/onewayhash.xml

Details

Key Data
Name Labtainers lab: onewayhash
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)
Cryptography (C) Public-Key Cryptography symmetric encryption and authentication; MESSAGE AUTHENTICATION CODE (MAC)
Forensics (F) Artifact Analysis cryptographic hashing

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/onewayhash.xml run

View source

labtainers/packet-introspection.xml

Details

Key Data
Name Labtainers lab: packet-introspection
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics network connections; data recovery and file content carving
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/packet-introspection.xml run

View source

labtainers/pass-crack.xml

Details

Key Data
Name Labtainers lab: pass-crack
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing
Software Security (SS) Authentication user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/pass-crack.xml run

View source

labtainers/pcapanalysis.xml

Details

Key Data
Name Labtainers lab: pcapanalysis
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics network connections
Network Security (NS) OSI (OPEN SYSTEM INTERCONNECT) MODEL APPLICATION LAYER; DATA LINK LAYER; NETWORK LAYER
Security Operations & Incident Management (SOIM) Monitor: Data Sources PCAP; network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/pcapanalysis.xml run

View source

labtainers/plc-app.xml

Details

Key Data
Name Labtainers lab: plc-app
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/plc-app.xml run

View source

labtainers/plc-forensics-adv.xml

Details

Key Data
Name Labtainers lab: plc-forensics-adv
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/plc-forensics-adv.xml run

View source

labtainers/plc-forensics.xml

Details

Key Data
Name Labtainers lab: plc-forensics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/plc-forensics.xml run

View source

labtainers/plc.xml

Details

Key Data
Name Labtainers lab: plc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/plc.xml run

View source

labtainers/pubkey.xml

Details

Key Data
Name Labtainers lab: pubkey
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Schemes TLS
Network Security (NS) Internet Architecture transport layer security

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/pubkey.xml run

View source

labtainers/radius.xml

Details

Key Data
Name Labtainers lab: radius
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; authentication in distributed systems
Network Security (NS) Internet Architecture link layer security

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/radius.xml run

View source

labtainers/remote-dns.xml

Details

Key Data
Name Labtainers lab: remote-dns
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Protocols and Vulnerability ADDRESS RESOLUTION PROTOCOL(ARP); ARP (ADDRESS RESOLUTION PROTOCOL); ARP SPOOFING; DNS ATTACKS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/remote-dns.xml run

View source

labtainers/retlibc.xml

Details

Key Data
Name Labtainers lab: retlibc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Software Security (SS) Mitigating Exploitation NON-EXECUTABLE MEMORY
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development; Mitigation bypass: non-executable memory

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/retlibc.xml run

View source

labtainers/routing-basics.xml

Details

Key Data
Name Labtainers lab: routing-basics
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Internet Architecture network layer security

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/routing-basics.xml run

View source

labtainers/routing-basics2.xml

Details

Key Data
Name Labtainers lab: routing-basics2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Internet Architecture network layer security

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/routing-basics2.xml run

View source

labtainers/setuid-env.xml

Details

Key Data
Name Labtainers lab: setuid-env
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Unix File Permissions; setuid/setgid

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/setuid-env.xml run

View source

labtainers/snort.xml

Details

Key Data
Name Labtainers lab: snort
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic
Security Operations & Incident Management (SOIM) Analyse: Analysis Methods misuse detection; anomaly detection
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures intrusion prevention systems
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems; IDS rules creation
Malware & Attack Technology (MAT) Malware Detection attack detection

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/snort.xml run

View source

labtainers/softplc.xml

Details

Key Data
Name Labtainers lab: softplc
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/softplc.xml run

View source

labtainers/softplc2.xml

Details

Key Data
Name Labtainers lab: softplc2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/softplc2.xml run

View source

labtainers/sql-inject.xml

Details

Key Data
Name Labtainers lab: sql-inject
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities Web vulnerabilities / OWASP Top 10; API vulnerabilities
Software Security (SS) Prevention of Vulnerabilities coding practices; Protecting against session management attacks; XSS; SQLi; CSRF; API design
Web & Mobile Security (WAM) Server-Side Vulnerabilities and Mitigations injection vulnerabilities; server-side misconfiguration and vulnerable components; SQL-INJECTION

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/sql-inject.xml run

View source

labtainers/ssh-agent.xml

Details

Key Data
Name Labtainers lab: ssh-agent
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/ssh-agent.xml run

View source

labtainers/sshlab.xml

Details

Key Data
Name Labtainers lab: sshlab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/sshlab.xml run

View source

labtainers/ssl.xml

Details

Key Data
Name Labtainers lab: ssl
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Public-Key Cryptography public-key encryption; public-key signatures
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems characteristics; security and privacy concerns
Cyber-Physical Systems Security (CPS) Cyber-Physical Systems Domains industrial control systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/ssl.xml run

View source

labtainers/symkeylab.xml

Details

Key Data
Name Labtainers lab: symkeylab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Cryptography (C) Schemes AES
Cryptography (C) Symmetric Cryptography symmetric primitives; symmetric encryption and authentication

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/symkeylab.xml run

View source

labtainers/sys-log.xml

Details

Key Data
Name Labtainers lab: sys-log
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources application logs: web server logs and files; system and kernel logs; Syslog

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/sys-log.xml run

View source

labtainers/tcpip.xml

Details

Key Data
Name Labtainers lab: tcpip
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Internet Architecture transport layer security
Network Security (NS) Network Protocols and Vulnerability common network attacks

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/tcpip.xml run

View source

labtainers/telnetlab.xml

Details

Key Data
Name Labtainers lab: telnetlab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) REMOTE ACCESS TELNET
Network Security (NS) TCP/IP SSH (SECURE SHELL); TELNET; TERMINAL EMULATION PROTOCOL (TELNET)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/telnetlab.xml run

View source

labtainers/vpnlab.xml

Details

Key Data
Name Labtainers lab: vpnlab
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools VIRTUAL - PRIVATE NETWORK (VPN)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/vpnlab.xml run

View source

labtainers/vpnlab2.xml

Details

Key Data
Name Labtainers lab: vpnlab2
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Network Security (NS) Network Defence Tools VIRTUAL - PRIVATE NETWORK (VPN)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/vpnlab2.xml run

View source

labtainers/webtrack.xml

Details

Key Data
Name Labtainers lab: webtrack
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) WEB WEB BROWSERS
Web & Mobile Security (WAM) Fundamental Concepts and Approaches BROWSER; cookies

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/webtrack.xml run

View source

labtainers/wireshark-intro.xml

Details

Key Data
Name Labtainers lab: wireshark-intro
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/wireshark-intro.xml run

View source

labtainers/xforge.xml

Details

Key Data
Name Labtainers lab: xforge
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Web & Mobile Security (WAM) Server-Side Vulnerabilities and Mitigations CROSS-SITE REQUEST FORGERY (CSRF)
Software Security (SS) Prevention of Vulnerabilities Protecting against session management attacks; XSS; SQLi; CSRF

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/xforge.xml run

View source

labtainers/xsite.xml

Details

Key Data
Name Labtainers lab: xsite
Description A Labtainers lab.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Web & Mobile Security (WAM) Server-Side Vulnerabilities and Mitigations CROSS-SITE SCRIPTING (XSS)
Software Security (SS) Prevention of Vulnerabilities Protecting against session management attacks; XSS; SQLi; CSRF

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/labtainers/xsite.xml run

View source

response_and_investigation/1_integrity_protection.xml

Details

Key Data
Name Integrity protection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Protecting integrity with file attributes; Protecting integrity with read-only filesystems.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://www.youtube.com/watch?v=sv1pHuuoW9g; https://www.youtube.com/watch?v=grISRv-CuHE
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Protecting integrity
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Linux read only protections: ro mounts; file attributes

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/1_integrity_protection.xml run

View source

response_and_investigation/2_integrity_detection.xml

Details

Key Data
Name Integrity detection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Detecting changes to resources using backups; File integrity checkers; Detecting changes to resources using package management.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://www.youtube.com/watch?v=qzyEdeQ_7ZY; https://www.youtube.com/watch?v=kz7m-iyzSOw
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing
Security Operations & Incident Management (SOIM) Monitor: Data Sources MONITORING - FILE INTEGRITY CHECKERS
Operating Systems & Virtualisation (OSV) OS Hardening code and data integrity checks

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/2_integrity_detection.xml run

View source

response_and_investigation/3_backups_and_recovery.xml

Details

Key Data
Name Backups lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot. Topics covered: Rsync, and backups and restoring data using differential and incremental backups.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/lak1Sued4GY; https://youtu.be/stVomGROfbQ; https://youtu.be/n8IKEJUOISY
VM names desktop; backup_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/3_backups_and_recovery.xml run

View source

response_and_investigation/4_ids.xml

Details

Key Data
Name IDS lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/raR0HstMnjg; https://youtu.be/3oDVTSFhl8Y; https://youtu.be/M6MisvbU32M
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic
Security Operations & Incident Management (SOIM) Analyse: Analysis Methods misuse detection; anomaly detection
Security Operations & Incident Management (SOIM) Execute: Mitigation and Countermeasures intrusion prevention systems
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems
Malware & Attack Technology (MAT) Malware Detection attack detection

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/4_ids.xml run

View source

response_and_investigation/5_ids_rules.xml

Details

Key Data
Name IDS rules lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/ZUMBsMppsLo; https://youtu.be/nuUm4NO_S1s
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic
Security Operations & Incident Management (SOIM) Analyse: Analysis Methods misuse detection; anomaly detection
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems; IDS rules creation
Malware & Attack Technology (MAT) Malware Detection attack detection

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/5_ids_rules.xml run

View source

response_and_investigation/6_exfiltration_detection.xml

Details

Key Data
Name Exfiltration detection lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/4zYn4hbwKYQ; https://youtu.be/Y32tmFrCEBk
VM names desktop; ids_snoop; web_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Artifact Analysis cryptographic hashing
Security Operations & Incident Management (SOIM) Monitor: Data Sources network traffic
Security Operations & Incident Management (SOIM) Analyse: Analysis Methods Exfiltation detection / data loss prevention
Network Security (NS) Network Defence Tools packet filters; intrusion detection systems; intrusion prevention systems; IDS rules creation

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/6_exfiltration_detection.xml run

View source

response_and_investigation/7_live_analysis.xml

Details

Key Data
Name Live analysis lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/aNvVtF437LI; https://www.youtube.com/watch?v=iUInvMrBw3k; https://youtu.be/9nyvtJRQ17w
VM names desktop; compromised_server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Main Memory Forensics process information; file information; network connections; artifacts and fragments; challenges of live forensics
Operating Systems & Virtualisation (OSV) OS Hardening anomaly detection
Authentication, Authorisation & Accountability (AAA) Accountability The fallibility of digital evidence to tampering
Malware & Attack Technology (MAT) Malware Detection identifying the presence of malware

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/7_live_analysis.xml run

View source

response_and_investigation/8_dead_analysis.xml

Details

Key Data
Name Dead analysis lab
Description A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/3kiV0ZJWmMY; https://youtu.be/0EafG4CLwA4
VM names desktop; hackerbot_server; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Forensics (F) Operating System Analysis storage forensics; data recovery and file content carving; Timeline analysis
Malware & Attack Technology (MAT) Malware Detection identifying the presence of malware
Authentication, Authorisation & Accountability (AAA) Accountability The fallibility of digital evidence to tampering

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/response_and_investigation/8_dead_analysis.xml run

View source

software_and_malware_analysis/10_anti_sre.xml

Details

Key Data
Name Anti-SRE
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

There are binaries to perform dynamic SRE.

Lab sheet here
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; anti-analysis and evasion techniques

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/10_anti_sre.xml run

View source

software_and_malware_analysis/1_dynamic_and_static_analysis.xml

Details

Key Data
Name Introdution to Malware analysis lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/14Hv_QodLxs; https://youtu.be/quKsZbpvYIY; https://youtu.be/CxZx7b3OPsg; https://youtu.be/3qmmqfBtJio; https://youtu.be/k3NwrFWuhaY
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml run

View source

software_and_malware_analysis/2_intro_to_c.xml

Details

Key Data
Name Introdution to C lab
Description
An introduction to C. Really important fundamentals. No flags this week.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thalita Vergilio
Linked videos https://youtu.be/chebVVwj1kM; https://youtu.be/2R4QzDAfzLQ
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Technical Underpinning Technical underpinnings for malware analysis: C

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/2_intro_to_c.xml run

View source

software_and_malware_analysis/3_c_and_asm.xml

Details

Key Data
Name C and Assembly lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

This week, we will finish our crash course in C programming by looking at structs, a data type used to represent composite data, memory management, one
of the biggest strengths of the C language, and bitwise operators, which you will find particularly helpful when looking at disassembled code. We will
then change our focus to assembly language. Starting with some basics, we will familiarise ourselves with the syntax and organisation of decompiled code
before moving onto recognising the structures we learned last week in the assembly code.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thalita Vergilio
Linked videos https://youtu.be/QbyorEb3WTs
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments
Malware & Attack Technology (MAT) Technical Underpinning Technical underpinnings for malware analysis: C; Technical underpinnings for malware analysis: ASM

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/3_c_and_asm.xml run

View source

software_and_malware_analysis/4_asm.xml

Details

Key Data
Name Recognising C Code Constructs in Assembly lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

We start with understanding how branching and conditionals are represented in assembly. We then move onto learning how to identify the common C code
constructs we saw in previous weeks in disassembled code, namely loops, function calls, switch statements, arrays and structs.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thalita Vergilio
Linked videos https://youtu.be/8b6JokfEFEo
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/4_asm.xml run

View source

software_and_malware_analysis/5_ghidra.xml

Details

Key Data
Name Ghidra lab
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/0zUmUZoEpC4; https://youtu.be/m73pHO_0vhI
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/5_ghidra.xml run

View source

software_and_malware_analysis/6_ghidra_analysis.xml

Details

Key Data
Name Ghidra lab analysis
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

There are two binaries to practice SRE with Ghidra.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; STATIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/6_ghidra_analysis.xml run

View source

software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml

Details

Key Data
Name Ghidra lab with LIVE MALWARE SAMPLES
Description You will find live malware samples in /opt/theZoo.
Type lab-sheet
Author Z. Cliffe Schreuders
Linked videos
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml run

View source

software_and_malware_analysis/7_dynamic.xml

Details

Key Data
Name Dynamic analysis SRE
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in
order to determine the password that the program expects. Once you have found the password, run the program and
enter the password to receive the file.

There are binaries to perform dynamic SRE.
Lab sheet here
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/6MeJIr3EKKM
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; DYNAMIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/7_dynamic.xml run

View source

software_and_malware_analysis/8_dynamic_continued.xml

Details

Key Data
Name Dynamic analysis SRE (cont.)
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in
order to determine the password that the program expects. Once you have found the password, run the program and
enter the password to receive the file.

There are binaries to perform dynamic SRE.

Lab sheet here
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/pExTbDVt0Gw
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments; DYNAMIC ANALYSIS

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/8_dynamic_continued.xml run

View source

software_and_malware_analysis/9_malware_behaviour.xml

Details

Key Data
Name Malware Behaviour
Description A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the
program expects. Once you have found the password, run the program and enter the password to receive the file.

There are binaries to perform dynamic SRE.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/6XMrHyAqD-4; https://youtu.be/KJPeZptzl1U; https://youtu.be/6qeDnjOaRiI
VM names metactf

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Malware & Attack Technology (MAT) Malware Taxonomy dimensions; kinds
Malware & Attack Technology (MAT) Malware Analysis analysis techniques; analysis environments

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_and_malware_analysis/9_malware_behaviour.xml run

View source

software_security_exploitation/1_c_asm_iof.xml

Details

Key Data
Name Understanding Software Vulnerabilities: C, Debugging Assembly, and Buffer Overflows
Description

A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/jo_07iOplzA; https://youtu.be/1Hy_166CwRk
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities Integer overflow
Software Security (SS) Prevention of Vulnerabilities language design and type systems

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/1_c_asm_iof.xml run

View source

software_security_exploitation/2_race_conditions_format_str.xml

Details

Key Data
Name Understanding Software Vulnerabilities: Injection Attacks, Race Conditions, and Format String Attacks
Description

A MetaCTF lab. In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you determing the password, run the program and enter the password to receive the file.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/nVpqjsfii6c; https://youtu.be/PH73lpG2B1M; https://youtu.be/Du3fVc_ZLiI
VM names desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities race condition vulnerabilities; structured output generation vulnerabilities; Format string attacks
Software Security (SS) Prevention of Vulnerabilities race condition mitigations; structured output generations mitigations

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/2_race_conditions_format_str.xml run

View source

software_security_exploitation/3_bug_hunting_and_fuzzing.xml

Details

Key Data
Name Bug Hunting and Fuzzing
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/nwxtlR31hvw; https://youtu.be/vT2PP7VnSNw
VM names windows_victim; kali; desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Detection of Vulnerabilities dynamic detection

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml run

View source

software_security_exploitation/4_exploit_development.xml

Details

Key Data
Name Exploit Development
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/Zh7IdmnCfy0; https://youtu.be/WU06L-u0t2Q; https://youtu.be/j2S-XgY-Fyg; https://youtu.be/Lf1UPaqPJMM; https://youtu.be/5OUQ7ExlgKI
VM names windows_victim; kali; windows_victim_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/4_exploit_development.xml run

View source

software_security_exploitation/5_linux_stack_bof.xml

Details

Key Data
Name Writing Exploits: Linux and Stack-smashing Buffer Overflows
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos https://youtu.be/oi_CfBe_umU; https://youtu.be/Wry2get_RRc
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/5_linux_stack_bof.xml run

View source

software_security_exploitation/6_linux_nx_bypass.xml

Details

Key Data
Name Linux bypassing NX bit with return-to-libc
Description
Similar to last week. Same C code, just compiled w/ stack protections and non-executable stack.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos https://youtu.be/ywLXfSR5YWk
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Software Security (SS) Mitigating Exploitation NON-EXECUTABLE MEMORY
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development; Mitigation bypass: non-executable memory

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/6_linux_nx_bypass.xml run

View source

software_security_exploitation/7_linux_aslr_bypass.xml

Details

Key Data
Name Linux ASLR bypass
Description
Practical challenges to bypass ASLR, PIE and RelRO.

Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos https://youtu.be/v2rChKDAmFg; https://youtu.be/xwsBaNQZozg
VM names metactf_desktop; kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows
Software Security (SS) Mitigating Exploitation ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION)
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development; Mitigation bypass: ASLR

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/7_linux_aslr_bypass.xml run

View source

software_security_exploitation/8_linux_bof_format.xml

Details

Key Data
Name Linux Buffer Overflows and Advanced Format String Attacks
Description
Lab sheet here.
Type ctf-lab; lab-sheet
Author Thomas Shaw
Linked videos
VM names metactf_desktop

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Software Security (SS) Categories of Vulnerabilities memory management vulnerabilities; Stack smashing buffer overflows; Format string attacks
Malware & Attack Technology (MAT) Attacks and exploitation EXPLOITATION; EXPLOITATION FRAMEWORKS; Exploit development; Metasploit Framework development

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/software_security_exploitation/8_linux_bof_format.xml run

View source

systems_security/1_authentication.xml

Details

Key Data
Name Authentication lab
Description
Lecture
Slides here

Reading
Chapter 11 "Authentication": Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)

Lab
A Hackerbot lab. Work through the lab instructions, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/2I_JSdTu-oI; https://youtu.be/pGcJEML1mRo; https://youtu.be/icC2Zrno_uM; https://youtu.be/Wrg6XZu6Luw
VM names desktop; server; hackerbot_server; kali_cracker

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords)
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation authentication and identification; Linux authentication; Types of user accounts

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/1_authentication.xml run

View source

systems_security/2_pam.xml

Details

Key Data
Name Pluggable Authentication Modules lab
Description
Lecture
Slides continued here

Reading
Chapter 4 "Users, Passwords, and Authentication": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Lab
A short lab this week, exploring PAM. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/z4L6Yv5ry1A; https://youtu.be/-zcnfmoLjYI; https://youtu.be/xHs3LB4Yyrk; https://youtu.be/c2dPdQmaVyo; https://youtu.be/dCBabesIXo8; https://youtu.be/rhdcxhSDqp4; https://youtu.be/PCXK2cK8tpE
VM names desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authentication identity management; user authentication; facets of authentication
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation authentication and identification; Linux authentication; Authentication frameworks (PAM)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/2_pam.xml run

View source

systems_security/4_access_controls.xml

Details

Key Data
Name Access Controls lab
Description
Lecture
Slides here

Reading
Chapter 1 "Foundations of Security and Access Control in Computing": Benantar, M. (2006), Access Control Systems: Security, Identity Management and Trust Models, Springer. (ISBN-10: 0387004459)

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/yWJyZEFbchQ; https://youtu.be/i0kO_3ExJv4
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); Vulnerabilities and attacks on access control misconfigurations
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Unix File Permissions; Filesystems; inodes; and commands; umask
Operating Systems & Virtualisation (OSV) Role of Operating Systems mediation

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/4_access_controls.xml run

View source

systems_security/5_suid.xml

Details

Key Data
Name Set User ID lab
Description
Lecture
Slides continued here

Reading
Chapter 6 "Filesystems and Security": Garfinkel, S. Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234)

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/viSkkNB777k; https://youtu.be/PGHsb3bg_h4
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Unix File Permissions; setuid/setgid; Hardlink protections

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/5_suid.xml run

View source

systems_security/6_facls.xml

Details

Key Data
Name Access Control Lists (ACLs) lab
Description
Lecture
Slides continued here

Reading
Grunbacher, Andreas. "POSIX Access Control Lists on Linux." USENIX Annual Technical Conference, FREENIX Track. 2003.

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.

Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/Bn3NJhgmdLk; https://youtu.be/OT7ifs8PkHI
VM names shared_desktop; server; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Access controls and operating systems; Linux security model; Linux Extended Access Control Lists (facl)

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/6_facls.xml run

View source

systems_security/7_containers.xml

Details

Key Data
Name Containers lab
Description
Lecture
Slides here

Reading
Z. C. Schreuders, T. McGill, and C. Payne, "The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls," Computers and Security, Volume 32, Elsevier B.V., 2013. DOI: 10.1016/j.cose.2012.09.007

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/f4yBcKkb12g
VM names desktop; hackerbot_server; chroot_esc_server; docker_esc_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation capabilities; Container-based sandboxes: chroot; Docker; Rule-based controls: Course grained: Linux capabilities; Vulnerabilities and attacks on sandboxing misconfigurations
Operating Systems & Virtualisation (OSV) Role of Operating Systems isolation; CONTAINERS
Web & Mobile Security (WAM) Fundamental Concepts and Approaches sandboxing

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/7_containers.xml run

View source

systems_security/8_apparmor.xml

Details

Key Data
Name AppArmor lab
Description
Lecture
Slides continued here

Lectures for the next two weeks
Secure software development

Secure design principles

Slides

Lab
A Hackerbot lab. Work through the labsheet, then when prompted interact with Hackerbot.
Type ctf-lab; hackerbot-lab; lab-sheet
Author Z. Cliffe Schreuders
Linked videos https://youtu.be/Xgs5akM6ayc
VM names desktop; hackerbot_server

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Authentication, Authorisation & Accountability (AAA) Authorisation ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes
Operating Systems & Virtualisation (OSV) Primitives for Isolation and Mediation Rule-based controls: Fine grained: AppArmor; Vulnerabilities and attacks on sandboxing misconfigurations
Software Security (SS) Mitigating Exploitation limiting privileges

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/systems_security/8_apparmor.xml run

View source

web_security/websec_lab.xml

Details

Key Data
Name Web security lab environment
Description An environment for web security labs. Kali Linux with Damn Vulnerable Web App server, WebGoat, and web sec tools.
Type lab-environment; ctf-lab
Author Z. Cliffe Schreuders
Linked videos
VM names kali

CyBOK KAs, Topics, and Keywords

KA Topic Keywords
Web & Mobile Security (WAM) Fundamental Concepts and Approaches web PKI and HTTPS; authentication; cookies; passwords and alternatives; JAVASCRIPT / HYPERTEXT MARKUP LANGUAGE (HTML) / CASCADING STYLE SHEETS (CSS) / HYPERTEXT TRANSFER PROTOCOL (HTTP)\n COOKIES; HYPERTEXT TRANSFER PROTOCOL (HTTP) - PROXYING; Broken Access Control / Insecure Direct Object References; SESSION HIJACKING; REPRESENTATIONAL STATE TRANSFER (REST)
Web & Mobile Security (WAM) Client-Side Vulnerabilities and Mitigations client-side storage; CLIENT-SIDE VALIDATION; clickjacking
Web & Mobile Security (WAM) Server-Side Vulnerabilities and Mitigations injection vulnerabilities; server-side misconfiguration and vulnerable components; CROSS-SITE SCRIPTING (XSS); SAME ORIGIN POLICY (SOP); COMMAND INJECTION; SQL-INJECTION; CROSS-SITE REQUEST FORGERY (CSRF); CONFUSED DEPUTY ATTACKS
Software Security (SS) Categories of Vulnerabilities Web vulnerabilities / OWASP Top 10; API vulnerabilities
Software Security (SS) Prevention of Vulnerabilities coding practices; Protecting against session management attacks; XSS; SQLi; CSRF; API design

Command to build VMs and start scenario:

ruby secgen.rb -s scenarios/labs/web_security/websec_lab.xml run

View source