Attack Techniques
Videos from TX WC, July 19, 2023
Basics
H 101-107: Binary Games
50
W 101: Linux command line
35
LJ: Linux Journey
83
B: Bandit Challenges
69
U-Cen and U-Cyb: PowerShell
75
Cloud and Local Servers
H 100: Kali Virtual Machine
10
ED 30: Linux Virtual Machine
15
H 201: Google Cloud Linux Server
10
PMA 60: Windows Cloud Server on Azure
15
Command Injection
ED 102: Command Injection
60
ED 103: SQLI Challenges
185
ED 104: CMD Injection
40
Networking
H 410: Nmap
40
H 420: Wireshark
110
H 430: Scapy
60
Advanced Command Injection
ED 105: Server Side Template Injection (SSTI)
35
W 401: Command Injection on Salt
30
ED 106: PHP-FPM Command Injection
15
Advanced Networking
H 130: sslh
10
H 131: Stealing an SSH Password with strace
10
Passwords & Cryptography
H 510: Reset Windows Password with an Install Disk
15
H 520: Hashcat
60
H 530: Blockchains
15
H 531: Hyperledger IROHA
15
H 532: Hacking PoWHCoin
15
Metasploit
H 310: Metasploit v. ActiveMQ
20
H 311: Adding a Custom Exploit to Metasploit
15
H 312: Writing a Custom Metasploit Module
25
H 320: Creating a Trojan with Metasploit
15
Advanced Networking with Python
VP 220: DNS
95
VP 230: Obfuscated HTTP
50
Burp, ZAP, & Postman
W 600: Burp & Web Security Academy (20 pts)
20
W 520: SAML
15
W 230: Manual Audit of Hackazon
20
W 530: Exploiting ECB Encryption
75
W 200: Google Cloud Linux Servers
15
ED 290: Desktop on a Cloud Linux Server
10
W 220: Zed Attack Proxy
20
W 300: Using an API with Postman
15
W 301: Using the Github API with Postman
10
Posted 6-18-23
ED 30 added 7-19-23