8.3: Tor and the Dark Web

Surf the web anonymously using the Tor browser. Deploy a hidden onion service.
80 min Updated Jun 8, 2022

8.2: Virtual Private Networks

Run a VPN access server on Google Cloud Platform to access the Internet.
36 min Updated Jun 6, 2022

7.1: Binary exploitation and defense

Exploit memory corruption vulnerabilities and prevent them using DEP, ASLR, and stack canaries.
86 min Updated May 26, 2022

3.1: Encoding and hashes

Perform encoding and cryptographic hashes with OpenSSL. Crack hashes with hashcat and John the Ripper.
28 min Updated Apr 27, 2022

3.2: Encryption

Experiment with symmetric and asymmetric encryption using OpenSSL
32 min Updated May 15, 2022

3.3: Digital signatures

Experiment with digital signatures and certificates using OpenSSL
72 min Updated May 19, 2022

2.2: Linux security

Learn basic, security-related Linux concepts and commands
58 min Updated May 18, 2022

2.1: Linux file system

Learn basic file system navigation in Linux
99 min Updated Jul 8, 2022

5.1: Network forensics

Analyze network traces using Wireshark
50 min Updated May 15, 2022

5.2: Network intelligence

Investigate network addresses using open-source intelligence tools.
43 min Updated May 18, 2022

5.3: DNS intelligence

Query open-source intelligence (OSINT) tools to investigate DNS activity.
46 min Updated May 18, 2022

5.4: Scanning

Scan networks with nmap, filter traffic with iptables, and reduce network attack surface on servers.
180 min Updated Jul 15, 2022

6.1: Privilege escalation and lateral movement

Compromise hosts via privilege escalation and lateral movement
70 min Updated May 18, 2022

6.2 Host forensics

Perform forensic analysis on hosts and examine methods for log tampering
49 min Updated Jun 8, 2022

6.3: File system backup and encryption

Experiment with Linux tools to backup and encrypt files
36 min Updated May 18, 2022

1.1: Setup

Setup course accounts and VMs
98 min Updated May 12, 2022

4.2: Phishing

Perform reconnaissance on employees using crosslinked and the recon-ng framework and examine phishing lures
105 min Updated Jul 20, 2022

8.1: OSINT

Perform reconnaissance using open-source intelligence tools such as crosslinked and the recon-ng framework
39 min Updated Jul 20, 2022

4.1: Authentication

Examine issues with password-based authentication
65 min Updated May 17, 2022
Loading Codelabs, please wait...