Skip to content
IP Fundamentals
A1: DNS
A1: dnsmasq
A1: Spoofer
A2: traceroute
A2: TLS – SSLKeylogfile
A2: Wireshark – Sniffing SSL/TLS
A2: Wireshark – Investigating suspicious traffic
Crypto Fundamentals
A3: Historical Crypto
A3: Modern Ciphers
A3: Block Ciphers
A3: Public Key Algorithms
A3: Hash Functions
A3: Message Authentication Codes
Web App Fundamentals
Programming / Scripting
A4: Mapping Pseudocode
A4: Regex Project
A7: JS Exercises
A7: JS Code interpretation
A8: Linux Bash Project
A10: Python Project
A11: C Project
A11: Assembly Exercise
A12: Java Project
Reverse Engineering
A14: Deobfuscation
Start CAS
Cyberchef
Cyberchef Intro
Cyberchef Forking
Cyberchef Web Requests
Cyberchef Forking & Webrequests
OSINT: Passive Reconnaissance
OSINT: Maltego
Reconnaissance
Scanning with nmap
Nessus Vulnerability Scanning
OpenVAS Vulnerability Scanning
DNS Scan 1
DNS Scan 2
Simple Reverse Shells
Metasploit Reverse Shell
DNS over http
Password Spraying
Mitm
SPF,DKIM,DMARC
Gophish Framework
Mitm – ssh
Mitm Reverse Proxy
Mitm – bettercap
Gaining Access
Social Media Scavenger Hunt
Metasploitable VM
Heartbleed OpenSSL
Memory Corruption Exploit1
Memory Corruption Exploit2
Memory Corruption Exploit3
Maintaining Access
Host and Service Discovery
Privilege Escalation
AD Information Gathering
Credential Dumping W10 Client
Lateral Movement
Own FS1
Situational Awareness on FS1
Password Spraying
Own WS1
Situational Awareness on WS1
Abusing Domain Admin
Responder & NTLM Relaying
CrackMapExec
Kerberoasting
Web Hacking 1
Cowbell Shop – XSS
XSS – BeEF Attack
XSS – DOM Based
XSS – Mitigation php Chat
XSRF – Cross Site Request Forgery
Cowbell Shop – SSRF
CSP Demo
CSP Puzzle
no sniff Playground
SQL Injection Attack
SQL Injection with union
Cowbellshop – no SQL
XML Path Traversal
Web Hacking 2
Cowbellshop – Templates
Script Gadgets
Rails Mass Assignment
Insecure Deserialization Java
HSTS Alexa Top 603387
Web App Firewall Bypass
Username enumeration
Cowbellshop – JWT
Threat Intelligence
Virus Total Graph
RFI Incoming!
Project Seshat
APT Report Review
Forensics
BitUnlocker
Unknown USB Stick
USB Stick Carving
Timestomping
System32 Anomaly Detection
Prefetch Parsing
Amcache Parsing
Timesketch Introduction
Proxy-Log Analysis
Malware Analysis
Malware Deobfuscation
Static Analysis with Ghidra
Writing Yara Rules
Android Malware
Android Basics
Modify Package
Malware RedAlert
Crackme Simple
App Tracing with Frida
Uncrackable Level 1
Malware BlackRoseLucy
Malware Lokibot
Crackme RE Challenge
Malware Gustuff
Live Response
LAB Introduction
Velociraptor Introduction
Velociraptor Lateral Movement
Velociraptor Persistence
Memory Dump Analysis
Forensic Readiness
LAB 2 (Ransomware)
LAB 3 (Create Hunts)
LAB 4 (Atomic Red Team)
LAB 5 (Improve detection)
Security Testing
RFP SAST
SDLC
PT Report / Snyk
CAS Cybersecurity 2020/21
My Hacking-Lab notes
Start CAS
Cyberchef
Cyberchef Intro
Cyberchef Forking
Cyberchef Web Requests
Cyberchef Forking & Webrequests
OSINT: Passive Reconnaissance
OSINT: Maltego
Reconnaissance
Scanning with nmap
Nessus Vulnerability Scanning
OpenVAS Vulnerability Scanning
DNS Scan 1
DNS Scan 2
Simple Reverse Shells
Metasploit Reverse Shell
DNS over http
Password Spraying
Mitm
SPF,DKIM,DMARC
Gophish Framework
Mitm – ssh
Mitm Reverse Proxy
Mitm – bettercap
Gaining Access
Social Media Scavenger Hunt
Metasploitable VM
Heartbleed OpenSSL
Memory Corruption Exploit1
Memory Corruption Exploit2
Memory Corruption Exploit3
Maintaining Access
Host and Service Discovery
Privilege Escalation
AD Information Gathering
Credential Dumping W10 Client
Lateral Movement
Own FS1
Situational Awareness on FS1
Password Spraying
Own WS1
Situational Awareness on WS1
Abusing Domain Admin
Responder & NTLM Relaying
CrackMapExec
Kerberoasting
Web Hacking 1
Cowbell Shop – XSS
XSS – BeEF Attack
XSS – DOM Based
XSS – Mitigation php Chat
XSRF – Cross Site Request Forgery
Cowbell Shop – SSRF
CSP Demo
CSP Puzzle
no sniff Playground
SQL Injection Attack
SQL Injection with union
Cowbellshop – no SQL
XML Path Traversal
Web Hacking 2
Cowbellshop – Templates
Script Gadgets
Rails Mass Assignment
Insecure Deserialization Java
HSTS Alexa Top 603387
Web App Firewall Bypass
Username enumeration
Cowbellshop – JWT
Threat Intelligence
Virus Total Graph
RFI Incoming!
Project Seshat
APT Report Review
Forensics
BitUnlocker
Unknown USB Stick
USB Stick Carving
Timestomping
System32 Anomaly Detection
Prefetch Parsing
Amcache Parsing
Timesketch Introduction
Proxy-Log Analysis
Malware Analysis
Malware Deobfuscation
Static Analysis with Ghidra
Writing Yara Rules
Android Malware
Android Basics
Modify Package
Malware RedAlert
Crackme Simple
App Tracing with Frida
Uncrackable Level 1
Malware BlackRoseLucy
Malware Lokibot
Crackme RE Challenge
Malware Gustuff
Live Response
LAB Introduction
Velociraptor Introduction
Velociraptor Lateral Movement
Velociraptor Persistence
Memory Dump Analysis
Forensic Readiness
LAB 2 (Ransomware)
LAB 3 (Create Hunts)
LAB 4 (Atomic Red Team)
LAB 5 (Improve detection)
Security Testing
RFP SAST
SDLC
PT Report / Snyk
Suche nach:
CAS Cybersecurity 2020/21
Start CAS
Cyberchef
Cyberchef Intro
Cyberchef Forking
Cyberchef Web Requests
Cyberchef Forking & Webrequests
OSINT: Passive Reconnaissance
OSINT: Maltego
Reconnaissance
Scanning with nmap
Nessus Vulnerability Scanning
OpenVAS Vulnerability Scanning
DNS Scan 1
DNS Scan 2
Simple Reverse Shells
Metasploit Reverse Shell
DNS over http
Password Spraying
Mitm
SPF,DKIM,DMARC
Gophish Framework
Mitm – ssh
Mitm Reverse Proxy
Mitm – bettercap
Gaining Access
Social Media Scavenger Hunt
Metasploitable VM
Heartbleed OpenSSL
Memory Corruption Exploit1
Memory Corruption Exploit2
Memory Corruption Exploit3
Maintaining Access
Host and Service Discovery
Privilege Escalation
AD Information Gathering
Credential Dumping W10 Client
Lateral Movement
Own FS1
Situational Awareness on FS1
Password Spraying
Own WS1
Situational Awareness on WS1
Abusing Domain Admin
Responder & NTLM Relaying
CrackMapExec
Kerberoasting
Web Hacking 1
Cowbell Shop – XSS
XSS – BeEF Attack
XSS – DOM Based
XSS – Mitigation php Chat
XSRF – Cross Site Request Forgery
Cowbell Shop – SSRF
CSP Demo
CSP Puzzle
no sniff Playground
SQL Injection Attack
SQL Injection with union
Cowbellshop – no SQL
XML Path Traversal
Web Hacking 2
Cowbellshop – Templates
Script Gadgets
Rails Mass Assignment
Insecure Deserialization Java
HSTS Alexa Top 603387
Web App Firewall Bypass
Username enumeration
Cowbellshop – JWT
Threat Intelligence
Virus Total Graph
RFI Incoming!
Project Seshat
APT Report Review
Forensics
BitUnlocker
Unknown USB Stick
USB Stick Carving
Timestomping
System32 Anomaly Detection
Prefetch Parsing
Amcache Parsing
Timesketch Introduction
Proxy-Log Analysis
Malware Analysis
Malware Deobfuscation
Static Analysis with Ghidra
Writing Yara Rules
Android Malware
Android Basics
Modify Package
Malware RedAlert
Crackme Simple
App Tracing with Frida
Uncrackable Level 1
Malware BlackRoseLucy
Malware Lokibot
Crackme RE Challenge
Malware Gustuff
Live Response
LAB Introduction
Velociraptor Introduction
Velociraptor Lateral Movement
Velociraptor Persistence
Memory Dump Analysis
Forensic Readiness
LAB 2 (Ransomware)
LAB 3 (Create Hunts)
LAB 4 (Atomic Red Team)
LAB 5 (Improve detection)
Security Testing
RFP SAST
SDLC
PT Report / Snyk
Security Testing
November 4, 2021 |
Cybercop