FREE
- Need Just Register, Login and Start.VIP
- Need Just Register, Login, Subscription and Start.
β Burp Suite
- Burp Suite is the industry standard tool for web application hacking, and is essential in any web penetration test
-
Free
- Burp Suite: The BasicsAn introduction to using Burp Suite for Web Application pentesting
-
Free
- Burp Suite: RepeaterLearn how to use Repeater to duplicate requests in Burp Suite
-
VIP
- Burp Suite: IntruderLearn how to use Intruder to automate requests in Burp Suite
-
VIP
- Burp Suite: Other ModulesTake a dive into some of Burp Suite's lesser known modules
-
VIP
- Burp Suite: ExtenderLearn how to use Extender to broaden the functionality of Burp Suite
-
β Metasploit
- Metasploit is the most widely used exploitation framework. Learn how to use it and unlock its full potential.
- Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.
- Learn the basics of passive and active network reconnaissance. Understand how common protocols work and their attack vectors.
β Nmap
- Learn how to leverage the Nmap network scanner to discover live hosts and open ports using basic and advanced scan options.
- Explore the different techniques to gain initial access to a target system and network from a red teamers perspective.
- Learn how to analyze and defend against phishing emails. Investigate real-world phishing attempts using a variety of techniques.
- Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s
- Understand what Offensive Security entails, and practice breaking into computer systems by exploiting applications and networks.
- Learn about the latest industry threats. Get hands-on experience identifying, exploiting, and mitigating critical vulnerabilities.
- Learn Defensive Security by using digital forensics in an investigation and applying security operations to stop a live cyber attack.
- Many servers and security tools use Linux. Learn how to use the Linux operating system, a critical skill in cyber security.
- To become a better hacker it's vital to understand the underlying functions of the world wide web and what makes it work.
- Understand what a penetration test involves, including testing techniques and methodologies every pentester should know.
- Learn the fundamental techniques that will allow you to elevate account privileges in Linux and windows systems.
- Learn how to bypass and evade different security solutions used in the industry such as firewalls, IDS/IPS, and antivirus.
VIP
- Network Security SolutionsLearn about and experiment with various IDS/IPS evasion techniques, such as protocol and payload manipulation.
VIP
- FirewallsLearn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.
VIP
- Sandbox EvasionLearn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.
- Understand, enumerate and attack various networking services in real-world environments.
- Familiarise yourself with the skills, research methods, and resources used to exploit vulnerable applications and systems.
- Become cyber aware and protect yourself from common security attacks by working through interactive real-world scenarios.
- Understand the core security issues with web applications, and learn how to exploit them using industry tools and techniques.
- Cryptography is essential in security. Learn how its used to preserve integrity and confidentiality of sensitive information.
- Understand what is offensive and defensive security, and learn about careers available in cyber.
- Hacking Windows is often daunting. Grasp the fundamentals of core Windows concepts and Active Directory vulnerabilities.
- Once you have initial access on a machine, learn how to escalate your account privileges to root.
- Strengthen your skills by exploiting a range of different applications and services, from networking to web to privilege escalation.
- Identify how attackers are developing their techniques to use in your defensive strategy.
- Learn how to configure and utilise tooling to ensure that suspicious activity is quickly identified and dealt with in your environment.
VIP
- Core Windows ProcessesExplore the core processes within a Windows operating system and understand what is normal behavior. This foundational knowledge will help you identify malicious processes running on an endpoint!
VIP
- SysinternalsLearn to use the Sysinternals tools to analyze Window systems or applications.
VIP
- Windows Event LogsIntroduction to Windows Event Logs and the tools to query them.
VIP
- SysmonLearn how to utilize Sysmon to monitor and log your endpoints and environments
Free
- SuricataLearn how to install and configure Suricata to detect real-time threats.
VIP
- OsqueryLearn how to use this operating system instrumentation framework to explore operating system data by using SQL queries.
VIP
- Splunk 101This room will cover the basics of Splunk.
VIP
- Splunk 2Part of the Blue Primer series. This room is based on version 2 of the Boss of the SOC (BOTS) competition by Splunk.
Free
- OpenEDRLearn what is Endpoint Detection and Response (EDR) with Comodo's OpenEDR.
- The best way to understand how attackers work is to get hands on experience with their techniques.
- Incidents are inevitable. Learn how to identify and respond to them.
- Analyse malicious files to prevent malicious actions and identify attacks.
- Learn the core concepts of how computers communicate with each other and types of network weaknesses.
- Get hands-on access to Windows and it's security controls. These basics will help you in identifying, exploiting and defending Windows.
- Learn to use PowerShell and Python in different stages of a penetration test and take your pentesting craft to the next level.
-
Free
- Python BasicsUsing a web-based code editor, learn the basics of Python and put your knowledge into practice by eventually coding a short Bitcoin investment project.
-
VIP
- Python for PentestersPython is probably the most widely used and most convenient scripting language in cybersecurity. This room covers real examples of Python scripts including hash cracking, key logging, enumeration and scanning.
-
VIP
- Hacking with PowerShellLearn the basics of PowerShell and PowerShell Scripting
-
VIP
- PowerShell for PentestersThis room covers the principle uses of PowerShell in Penetration Tests. Interacting with files, scanning the network and system enumeration are covered.
-