Blue Team

Cyber Security Analyst Learning Path

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence Topic 1A: Identify Security Control Types Review Activity: Security Control Types Topic 1B: Explain the Importance of Threat Data and Intelligence Review Activity: Threat Data and Intelligence Lesson 1: Practice Questions Lesson 1 PBQ: Explaining the Importance of Security Controls and Security Intelligence https://hack.technoherder.com/cybersecurity-control/ […]

Web App Attack

Web Attack Cheat Sheet

Discovering Targets https://github.com/arkadiyt/bounty-targets-data# This repo contains data dumps of Hackerone and Bugcrowd scopes (i.e. the domains that are eligible for bug bounty reports). IP Enumeration http://www.asnlookup.com# This tool leverages ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes. https://github.com/pielco11/fav-up# Lookups for real IP starting from the favicon […]

Hacking 101 Social Engineering

Social Engineering – Lab

In this lab you are going to perform social engineering activities using the Social-Engineer Toolkit (SET). “The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.” – https://github.com/trustedsec/social-engineer-toolkit Note: A key selling point of many […]

Hacking 101 Post-Exploitation

Post-Exploitation – Lab

Prereq – Have a local instance of Kali running and finish the Metasploit lab. https://hack.technoherder.com/vm-setup-kali-metasploitable2/ https://hack.technoherder.com/metasploit-2/ Part 1 – John the Ripper Let’s say you have password hashes from an earlier exploit. (Such as the password hashes obtain in the Metasploit Lab).  While that was helpful by itself to see what usernames exist, it would […]

Hacking 101 Network Attack Network Scan & Map

Metasploit – Lab

Metasploit is an open source platform for vulnerability research, exploit development, and the creation of custom security tools. In this lab, we’re going to be using Metasploit to attack the Metasploitable2 VM. Preqreq – have a local Kali instance and Measploitable2 VM running. https://hack.technoherder.com/vm-setup-kali-metasploitable2/ Activities Part 1 – Getting Started Update Kali: Start the Kali […]

Active Reconnaissance Hacking 101 Network Scan & Map Tools

Scanning with Nmap – Lab

Prereq – Have a local Kali instance running and Metasploitable2 for a target. https://hack.technoherder.com/vm-setup-kali-metasploitable2/ Part 1 – Setup Launch both Kali Linux and the Metasploitable2 VM and ensure that they are on the same isolated network. Chech which version of nmap you have installed. The nmap commands have evolved slightly over time.  It’s important to […]