├── .DS_Store ├── Security Tools ├── .DS_Store ├── Cyber Threat Intelligence Certificate.pdf ├── Security Tools: Use Metasploit MS08-067.png ├── Security Tools: Migrate to a new process.png ├── Security Tools: Use Metasploit Port Forwarding .png ├── Security Tools- Use Metasploit to exploit MS17-010.png ├── Security Tools: Perform a TCP port scan using NMAP.png ├── Security Tools: Perform a UDP port scan using nmap.png ├── Security Tools: Use Metasploit to exploit MS12-020.png ├── Security Tools: Use Meterpreter to take screenshots.png ├── Security Tools: Perform a vulnerability scan with OpenVas.png ├── Security Tools: Create a reverse shell executable using msfvenom.png ├── Security Tools: Use Meterpreter to take pictures from the webcam.png ├── Security Tools: Use Mimikatz to perform a Pass-The-Hash attack.png ├── Security Tools: Use Meterpreter to interact with the Windows Registry.png ├── Security Tools: Use TheHarvester.py to gather information about targets.png ├── Security Tools: Use Metasploit to identify a machine vulnerable to MS17-010.png ├── Security Tools: Use Meterpreter to steal credentials using the keylogger feature.png ├── Security Tools: Escalete priviledges to SYSTEM using Meterpreter's command GETSYSTEM.png ├── Security Tools: Use Metasploit CheckVM module to detect whether Meterpreter is running a Vm.png └── Security Tools: Use Meterpreter to sump password hashes stores in the SAM database and LSASS.png ├── Research:Documentation ├── .DS_Store ├── Research-Top Penetration Testing Tools.png ├── Research-Cyber Kill chain and MITRE Matrix.png ├── Research - The most common security log sources.png ├── Research - write an article on a recent cyber breach.png ├── Research - The major types of enterprise security software.png ├── Research-Difference between Penetration Testing and Red Teaming.png └── Research - the most common network protocols and their vulnerabilities.png ├── lab setup certifications ├── .DS_Store ├── Lab Setup-video-recording.png ├── Lab Setup: Virtual Machine.png ├── lab setup-Malware Dataset.png ├── Lab setup- Software Development.png ├── lab setup - Reverse Engineering.png ├── lab setup-Threat Hunting with YATA.png └── Lab Setup: Threat Hunting with Pandas.png ├── Penetration Testing └── Google Hacking.png ├── Cyber Defence ├── PS script to disable LLMNR.png ├── PS Script to turn on Hyper-V.png ├── PS Script tto turn on Windows Firewall.png ├── PS Script to list missing security patches.png ├── Write a PS Script to turn on Windows Defender.png ├── PS Script to detect installed anti-virus software.png ├── PS Script to turn on Automatic Sample Submission.png └── PS Script that edits the registry to mark LSASS.exe as a protected process.png ├── Keerthana's Mossé Journey: Security Tools Conquered .pdf ├── Threat Hunting ├── Threat Hunting: Write a YARA rule that can find itself.png ├── Write a YARA rule that detects suspucious Windows APIs.png ├── Write a YARA rule that identifies Chinese Executables.png ├── Write a YARA rule that can find improperly signed executables.png ├── Threat Hunting: Write a YARA rule that is professionally documented.png ├── Write a YARA rule that searches for strings using hex and wild-cards.png ├── Threat Hunting: Write a YARA Rule that can find small portable executables.png └── Threat Hunting: Write a YARA rule that can find binaries that have more than 3 URLs.png ├── Malware Development └── Malware Development: Write a program that captures clipboard data.png ├── Red Teaming └── Red Teaming: Exclude a folder from anti-virus scanning and run mimikatz from there.png └── README.md /.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/.DS_Store -------------------------------------------------------------------------------- /Security Tools/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/.DS_Store -------------------------------------------------------------------------------- /Research:Documentation/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/.DS_Store -------------------------------------------------------------------------------- /lab setup certifications/.DS_Store: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/.DS_Store -------------------------------------------------------------------------------- /Penetration Testing/Google Hacking.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Penetration Testing/Google Hacking.png -------------------------------------------------------------------------------- /Cyber Defence/PS script to disable LLMNR.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS script to disable LLMNR.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script to turn on Hyper-V.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script to turn on Hyper-V.png -------------------------------------------------------------------------------- /lab setup certifications/Lab Setup-video-recording.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/Lab Setup-video-recording.png -------------------------------------------------------------------------------- /lab setup certifications/Lab Setup: Virtual Machine.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/Lab Setup: Virtual Machine.png -------------------------------------------------------------------------------- /lab setup certifications/lab setup-Malware Dataset.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/lab setup-Malware Dataset.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script tto turn on Windows Firewall.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script tto turn on Windows Firewall.png -------------------------------------------------------------------------------- /Keerthana's Mossé Journey: Security Tools Conquered .pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Keerthana's Mossé Journey: Security Tools Conquered .pdf -------------------------------------------------------------------------------- /Security Tools/Cyber Threat Intelligence Certificate.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Cyber Threat Intelligence Certificate.pdf -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Metasploit MS08-067.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Metasploit MS08-067.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script to list missing security patches.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script to list missing security patches.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Migrate to a new process.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Migrate to a new process.png -------------------------------------------------------------------------------- /lab setup certifications/Lab setup- Software Development.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/Lab setup- Software Development.png -------------------------------------------------------------------------------- /lab setup certifications/lab setup - Reverse Engineering.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/lab setup - Reverse Engineering.png -------------------------------------------------------------------------------- /Cyber Defence/Write a PS Script to turn on Windows Defender.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/Write a PS Script to turn on Windows Defender.png -------------------------------------------------------------------------------- /lab setup certifications/lab setup-Threat Hunting with YATA.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/lab setup-Threat Hunting with YATA.png -------------------------------------------------------------------------------- /Research:Documentation/Research-Top Penetration Testing Tools.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research-Top Penetration Testing Tools.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script to detect installed anti-virus software.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script to detect installed anti-virus software.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script to turn on Automatic Sample Submission.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script to turn on Automatic Sample Submission.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Metasploit Port Forwarding .png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Metasploit Port Forwarding .png -------------------------------------------------------------------------------- /lab setup certifications/Lab Setup: Threat Hunting with Pandas.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/lab setup certifications/Lab Setup: Threat Hunting with Pandas.png -------------------------------------------------------------------------------- /Research:Documentation/Research-Cyber Kill chain and MITRE Matrix.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research-Cyber Kill chain and MITRE Matrix.png -------------------------------------------------------------------------------- /Security Tools/Security Tools- Use Metasploit to exploit MS17-010.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools- Use Metasploit to exploit MS17-010.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Perform a TCP port scan using NMAP.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Perform a TCP port scan using NMAP.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Perform a UDP port scan using nmap.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Perform a UDP port scan using nmap.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Metasploit to exploit MS12-020.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Metasploit to exploit MS12-020.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Meterpreter to take screenshots.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Meterpreter to take screenshots.png -------------------------------------------------------------------------------- /Threat Hunting/Threat Hunting: Write a YARA rule that can find itself.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Threat Hunting: Write a YARA rule that can find itself.png -------------------------------------------------------------------------------- /Threat Hunting/Write a YARA rule that detects suspucious Windows APIs.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Write a YARA rule that detects suspucious Windows APIs.png -------------------------------------------------------------------------------- /Threat Hunting/Write a YARA rule that identifies Chinese Executables.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Write a YARA rule that identifies Chinese Executables.png -------------------------------------------------------------------------------- /Research:Documentation/Research - The most common security log sources.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research - The most common security log sources.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Perform a vulnerability scan with OpenVas.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Perform a vulnerability scan with OpenVas.png -------------------------------------------------------------------------------- /Research:Documentation/Research - write an article on a recent cyber breach.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research - write an article on a recent cyber breach.png -------------------------------------------------------------------------------- /Threat Hunting/Write a YARA rule that can find improperly signed executables.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Write a YARA rule that can find improperly signed executables.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Create a reverse shell executable using msfvenom.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Create a reverse shell executable using msfvenom.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Meterpreter to take pictures from the webcam.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Meterpreter to take pictures from the webcam.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Mimikatz to perform a Pass-The-Hash attack.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Mimikatz to perform a Pass-The-Hash attack.png -------------------------------------------------------------------------------- /Research:Documentation/Research - The major types of enterprise security software.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research - The major types of enterprise security software.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Meterpreter to interact with the Windows Registry.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Meterpreter to interact with the Windows Registry.png -------------------------------------------------------------------------------- /Threat Hunting/Threat Hunting: Write a YARA rule that is professionally documented.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Threat Hunting: Write a YARA rule that is professionally documented.png -------------------------------------------------------------------------------- /Threat Hunting/Write a YARA rule that searches for strings using hex and wild-cards.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Write a YARA rule that searches for strings using hex and wild-cards.png -------------------------------------------------------------------------------- /Malware Development/Malware Development: Write a program that captures clipboard data.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Malware Development/Malware Development: Write a program that captures clipboard data.png -------------------------------------------------------------------------------- /Research:Documentation/Research-Difference between Penetration Testing and Red Teaming.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research-Difference between Penetration Testing and Red Teaming.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use TheHarvester.py to gather information about targets.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use TheHarvester.py to gather information about targets.png -------------------------------------------------------------------------------- /Cyber Defence/PS Script that edits the registry to mark LSASS.exe as a protected process.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Cyber Defence/PS Script that edits the registry to mark LSASS.exe as a protected process.png -------------------------------------------------------------------------------- /Threat Hunting/Threat Hunting: Write a YARA Rule that can find small portable executables.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Threat Hunting: Write a YARA Rule that can find small portable executables.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Metasploit to identify a machine vulnerable to MS17-010.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Metasploit to identify a machine vulnerable to MS17-010.png -------------------------------------------------------------------------------- /Red Teaming/Red Teaming: Exclude a folder from anti-virus scanning and run mimikatz from there.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Red Teaming/Red Teaming: Exclude a folder from anti-virus scanning and run mimikatz from there.png -------------------------------------------------------------------------------- /Research:Documentation/Research - the most common network protocols and their vulnerabilities.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Research:Documentation/Research - the most common network protocols and their vulnerabilities.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Meterpreter to steal credentials using the keylogger feature.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Meterpreter to steal credentials using the keylogger feature.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Escalete priviledges to SYSTEM using Meterpreter's command GETSYSTEM.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Escalete priviledges to SYSTEM using Meterpreter's command GETSYSTEM.png -------------------------------------------------------------------------------- /Threat Hunting/Threat Hunting: Write a YARA rule that can find binaries that have more than 3 URLs.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Threat Hunting/Threat Hunting: Write a YARA rule that can find binaries that have more than 3 URLs.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Metasploit CheckVM module to detect whether Meterpreter is running a Vm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Metasploit CheckVM module to detect whether Meterpreter is running a Vm.png -------------------------------------------------------------------------------- /Security Tools/Security Tools: Use Meterpreter to sump password hashes stores in the SAM database and LSASS.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/simplykeerthana/Mosse-Cybersecurity-Internship/HEAD/Security Tools/Security Tools: Use Meterpreter to sump password hashes stores in the SAM database and LSASS.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Mosse-Cybersecurity-Internship 2 | 3 | This is a cybersecurity Internship Online Platform to receive a professional industry recognized certificate. 4 | 5 | Goal to complete this Internship before February 2020. 6 | 7 | 8 | **** all these content below is from the internship dashboard. This readme is a checklist to keep me on track. 9 | 10 | I am currently interning with Mossé Cyber Security Institute in their Remote Internship Programme in order to develop and acquire the industry desired practical skills. The experience I gain through successfully completing their practical skills Internship Programme will provide me with professional confidence, acumen and experience to apply for any industry technology or security team position. This also positions me to provide the rigour to research and deliver appropriate technology solutions, thus becoming a valued member of the IT community. 11 | 12 | Some of the skills this remote internship programme imparts: 13 | 14 | Perform network vulnerability scans 15 | Exploit vulnerabilities with Metasploit 16 | Identify and exploit web application vulnerabilities without tools 17 | Write custom offensive security tools to aid Red Teaming operators 18 | Assess the security settings of Windows machines and harden them 19 | Hunt for malware using YARA 20 | Hunt for threat actors on Windows networks using Python 21 | Defend web applications against common vulnerabilities 22 | 23 | 24 | **** Lab Setup (8) Completed 25 | 26 | 1. Video Recording (Completed: yes) 27 | 2. Virutal Machine (Completed: yes) 28 | 3. Software Development (Completed: yes) 29 | 4. Threat Detections (Completed:yes) 30 | 5. Threat Hunting with Pandas (Completed:yes ) 31 | 6. Threat Hunting with YARA (Completed: yes) 32 | 7. Malware Dataset (Completed:yes) 33 | 8. Reverse Engineering (Completed: yes) 34 | 35 | 36 | **** Internship Curriculum 37 | 38 | 1. Security Tools (MODULE ACCOMPLISHED) 39 | USE METASPLOIT TO IDENTIFY A MACHINE VULNERABLE TO MS17-010 (Completed:yes) 40 | USE METASPLOIT TO EXPLOIT MS17-010 (Completed: yes) 41 | ESCALATE PRIVILEGES TO SYSTEM USING METERPRETER’S COMMAND GETSYSTEM (Completed: yes ) 42 | USE METERPRETER TO DUMP PASSWORD HASHES STORED IN THE SAM DATABASE AND LSASS (Completed:yes) 43 | PERFORM A TCP PORT SCAN USING NMAP (Completed: yes) 44 | PERFORM A UDP PORT SCAN USING NMAP (Completed: yes) 45 | PERFORM A VULNERABILITY SCAN WITH OPENVAS (Completed: yes ) 46 | USE THEHARVESTER.PY TO GATHER INFORMATION ABOUT TARGETS (Completed: yes) 47 | USE METASPLOIT'S PORT FORWARDING CAPABILITIES TO GAIN ACCESS TO A MACHINE THAT DOESN'T HAVE DIRECT INTERNET ACCESS (Completed: yes) 48 | USE MIMIKATZ TO PERFORM A PASS-THE-HASH ATTACK (Completed: yes ) 49 | 50 | 2. Penetration Testing 51 | WRITE A PS SCRIPT THAT ENABLES THE ALWAYSINSTALLELEVATED REGISTRY KEY (Completed: yes ) 52 | WRITE A WEB SHELL IN PHP (Completed: yes ) 53 | WRITE A WEB APPLICATION VULNERABLE TO ARBITRARY COMMAND EXECUTION (Completed:yes ) 54 | WRITE A PHP APPLICATION WITH AN EXPOSED PHPINFO.PHP PAGE (Completed: yes) 55 | GOOGLE HACKING (Completed: yes) 56 | WRITE A PS SCRIPT THAT INSTALLS AN INSECURE WINDOWS SERVICE (Completed: ) 57 | EXECUTE ARBITRARY COMMANDS ON A SERVER VIA A SQL INJECTION VULNERABILITY (Completed: ) 58 | WRITE A WEB APPLICATION WITH INSECURE XSS FILTERS (Completed: ) 59 | WRITE A TOOL TO BRUTE AUTHENTICATION PAGES (Completed: ) 60 | WRITE A WEB APPLICATION PENETRATION TESTING CHECKLIST (Completed: yes) 61 | 62 | 3. Cyber Defence 63 | WRITE A PROGRAM THAT COPIES SYSMON TO REMOTE MACHINES AND INSTALLS IT WITH A GIVEN CONFIGURATION FILE (Completed: ) 64 | WRITE A SCRIPT THAT EDITS THE REGISTRY TO MARK LSASS.EXE AS A PROTECTED PROCESS (Completed: yes ) 65 | WRITE A POWERSHELL SCRIPT TO TURN ON HYPER-V (Completed: yes ) 66 | WRITE A POWERSHELL SCRIPT TO LIST MISSING SECURITY PATCHES (Completed: yes) 67 | WRITE A POWERSHELL SCRIPT TO DISABLE LLMNR (Completed: yes ) 68 | WRITE A POWERSHELL SCRIPT TO TURN ON AUTOMATIC SAMPLE SUBMISSION (Completed:yes) 69 | WRITE A POWERSHELL SCRIPT TO TURN ON WINDOWS DEFENDER (Completed: yes ) 70 | WRITE A POWERSHELL SCRIPT TO TURN ON THE WINDOWS FIREWALL: (Completed: yes) 71 | WRITE A PS SCRIPT THAT DETECTS WHETHER A MACHINE HAS MORE THAN 1 LOCAL ADMINISTRATOR (Completed: ) 72 | WRITE A POWERSHELL SCRIPT THAT DETECTS INSTALLED ANTI-VIRUS SOFTWARE (completed: yes) 73 | 74 | 4. Threat Hunting 75 | PERFORM THREAT HUNTING AGAINST 2 MACHINES (completed: ) 76 | PERFORM THREAT HUNTING AGAINST 5 MACHINES (completed: ) 77 | WRITE A YARA RULE THAT CAN FIND ITSELF (Completed: yes ) 78 | WRITE A YARA RULE THAT CAN FIND BINARIES THAT HAVE MORE THAN 3 URLS (completed:yes ) 79 | WRITE A YARA RULE THAT IS PROFESSIONALLY DOCUMENTED (Completed:yes ) 80 | WRITE A YARA RULE THAT IDENTIFIES CHINESE EXECUTABLES (Completed: yes) 81 | WRITE A YARA RULE THAT CAN FIND SMALL PORTABLE EXECUTABLES (Completed: yes ) 82 | WRITE A YARA RULE THAT CAN FIND IMPROPERLY SIGNED EXECUTABLES (Completed: yes) 83 | WRITE A YARA RULE THAT SEARCHES FOR STRINGS USING HEX AND WILD-CARDS (Completed: yes ) 84 | WRITE A YARA RULE THAT DETECTS SUSPICIOUS WINDOWS APIS (completed:yes) 85 | 86 | 5. Secure Software Development 87 | WRITE A WEB APPLICATION THAT CORRECTLY UTILISES THE SECURE COOKIE FLAG (Completed: yes) 88 | WRITE A WEB APPLICATION THAT CORRECTLY UTILISES THE HTTP ONLY COOKIE FLAG (Completed: yes ) 89 | WRITE A WEB APPLICATION THAT AUTOMATICALLY LOGS OUT USERS AFTER 5 MINUTES OF INACTIVITY (Completed: yes ) 90 | WRITE A WEB APPLICATION THAT DETECTS AND SAFELY HANDLES CRASHES AND EXCEPTIONS (Completed: ) 91 | WRITE A WEB APPLICATION THAT PREVENTS CLICKJACKING (Completed: ) 92 | WRITE A WEB APPLICATION THAT PROVIDES A SECURE LOGIN FORM (Completed: ) 93 | WRITE A WEB APPLICATION THAT ENFORCES A STRONG PASSWORD POLICY AND DISPLAYS A PASSWORD STRENGTH METER (Completed: ) 94 | WRITE A WEB APPLICATION THAT DETECTS AND BLOCKS BRUTE FORCE ATTACKS (Completed: ) 95 | WRITE A WEB APPLICATION THAT BLOCKS CROSS-SITE REQUEST FORGERY (Completed: ) 96 | WRITE A WEB APPLICATION THAT DETECTS AND BLOCKS AUTOMATED INPUT SUBMISSION TOOLS (Completed: ) 97 | 98 | 6. Red Teaming 99 | WRITE A TCP REVERSE-SHELL AS A WINDOWS EXECUTABLE (Completed: ) 100 | WRITE A HTTPS REVERSE-SHELL (Completed: ) 101 | EXCLUDE A FOLDER FROM ANTI-VIRUS SCANNING AND RUN MIMIKATZ FROM THERE (Completed:yes ) 102 | PERSIST ON A WINDOWS MACHINE WITH A MALICIOUS USER ACCOUNT (Completed: yes) 103 | CLONE THE AUTHENTICATION WEB PAGE OF A BANK AND STEAL USER CREDENTIALS (Completed: ) 104 | WRITE A STANDALONE KEYLOGGER (Completed: yes) 105 | WRITE A WINDOWS HOST ENUMERATION PROGRAM (Completed: yes) 106 | WRITE MALWARE THAT DETECTS INSTALLED ANTI-VIRUS SOFTWARE (Completed: yes) 107 | WRITE MALWARE THAT VALIDATES ITS TARGET BEFORE RUNNING (Completed: ) 108 | WRITE MALWARE THAT DETECTS WINDOWS PROXY SETTINGS AND MAKES AN OUTBOUND CONNECTION (completed: ) 109 | 110 | 111 | 112 | 113 | 114 | *** Research Based Exercises *** 115 | 116 | 1. Research the top penetration testing tools (Completed: yes ) 117 | 2. research and write an article on a recent cyber breach (Completed: ) 118 | 3. Research the Cyber Kill Chain Model and the MITRE Matrix (Completed: yes ) 119 | 4. Research the major types of enterprise security software. (Completed:yes ) 120 | 5. Research the most common security log sources (Completed:yes ) 121 | 6. Reesearch the most common network protocols and their vulnerabilities (Completed: yes) 122 | 7. Research the different types of Windsows Credentials (Completed: ) 123 | 8. Write a Password Politcy (Completed: ) 124 | 9. Write an IT asset Inventory Spreadsheet template. (Completed: ) 125 | 10. Research and explain the phases that constitute a Red Team Management. (Completed: ) 126 | 11. Research and explain the difference between Penetration Testing and Red Teaming (Completed:yes ) 127 | 12. Write a simple Risk Matrix (Completed: ) 128 | 13. Write multiple Security Awareness Posters (Completed: ) 129 | 14. Write an IT Asset Inventory Spreadsheet template. (Completed: ) 130 | 131 | 132 | **** Web- Application Vulnerabilities 133 | 134 | 1. WRITE A PHP APPLICATION WITH AN EXPOSED PHPINFO.PHP PAGE (Completed: ) 135 | 2. WRITE AN APPLICATION VULNERABLE TO CROSS-SITE SCRIPTING (Completed: ) 136 | 3. WRITE A WEB APPLICATION VULNERABLE TO ARBITRARY COMMAND EXECUTION (Completed: ) 137 | 4. WRITE AN APPLICATION VULNERABLE TO DEFAULT CREDENTIALS (Completed: ) 138 | 5. WRITE AN APPLICATION VULNERABLE TO COOKIE INJECTION (Completed: ) 139 | 140 | **** Vulnerability Scanning 141 | 142 | 1. Use OWASP ZAP to scan a website for vulnerabilites 143 | 144 | **** Windows Programming (5) 145 | 146 | 1. WRITE A PROGRAM TO DETECT WHETHER A FOLDER IS WRITABLE (Completed: ) 147 | 2. WRITE A PROGRAM TO DETECT WHETHER A SERVICE IS WRITEABLE (Completed: ) 148 | 3. WRITE A PROGRAM TO DETECT WHETHER A SCHEDULED TASK IS WRITABLE (Completed: ) 149 | 4. WRITE A PROGRAM THAT READS AND WRITES FILES FROM DISK USING THE WINDOWS APIS (Completed: ) 150 | 5. WRITE A DLL THAT SHOWS A HELLO WORLD WHEN RUN WITH RUNDLL32.EXE (Completed: ) 151 | 152 | **** Malware Development(5) 153 | 154 | 1. Write a Program that captures clipboard data (Completed: yes) 155 | 2. Write a Program that captures screenshots (Completed: ) 156 | 3. Draft five spear-phising emails (Completed: ) 157 | 4. Write a web shell in PHP (Completed: ) 158 | 5. Write a program that fuzzes web directories (Completed: ) 159 | 6. Write a TCP reverse-shell as Windows executable (Completed: ) 160 | 7. Wite a HTTPS reverse-shell as a Windows executable (Completed: ) 161 | 8. Write a HTTPS reverse-shell as SSL pinning (Completed: ) 162 | 9. Write a TCP reverse-shell as a DLL (Completed: ) 163 | 10. Write a malware that automatically bypasses UAC (Completed: ) 164 | 165 | 166 | **** Network and Application Reconnaissance 167 | 168 | 1. Brute force web directories and files using WFUZZ (Completed: ) 169 | 2. Extract Document metadata using Metagoofil (Completed: ) 170 | 3. Perform DNS scans using Fierce (Completed: ) 171 | 172 | **** Web Application Testing Tools 173 | 174 | 1. Use Burp Suite's Spider to crawl a website (Completed: ) 175 | 2. Use Burp Suite to brute force an authentication web page.(Completed: ) 176 | 3. Use BeEF to exploit users using a cross-site scripting vulnerability (Completed: ) 177 | 4. Use Burp Suite to fuzz the user inputs of a website (Completed: ) 178 | 179 | #####Training Modules#### 180 | 181 | **** MICS101 Internet Searching **** (9 Points) 182 | 183 | 1. Google Hacking (completed: ) 184 | 2. Use Google to identify open FTP servers (completed: ) 185 | 3. Use Bing to find all the external links that a website contains (Completed: yes) 186 | 4. Use Google's cache capability to retrieve deleted web pages (completed: ) 187 | 5. Use Web Archives to view old versions of websites (completed: yes) 188 | 6. Use Web Archives to find people's old website (completed: ) 189 | 7. Use Google Translate (Completed: yes) 190 | 8. Use Advantage to generate complex Google search queries (completed: ) 191 | 192 | **** MICS102 - Technical Concepts **** (5 Points) 193 | 194 | 1. Research the top penetration testing tools (Completed: yes) 195 | 2. Research and write an article on a recent cyber breach (Completed: yes) 196 | 3. Research the Cyber Kill Chain Model and the MITRE Matrix (Completed: yes) 197 | 4. Research the major types of enterprise security software (Completed: yes) 198 | 5. Research the most common network protocols and their vulnerabilities (Completed: yes) 199 | 200 | **** MICS103 - Enterprise Securitty Concepts **** (10 Points) 201 | 202 | 1. Research the difference between procedures, guidelines, and policies (Completed: ) 203 | 2. Research ways that organizations may attempt to compromise your professional ethics (Completed: ) 204 | 3. Research what are controls and the different types of controls that exist (Completed: ) 205 | 4. Research the different types of risk (inherent risk, control risk, detection risk, and overall audit risk (Completed: ) 206 | 5. Research the four different types of risk response options (Completed: ) 207 | 6. Explain the difference between a threat, a vulnerability and an exploit (Completed: ) 208 | 7. Explain the difference between an issue and a risk (Completed: ) 209 | 8. Research the difference types of audits (Completed: ) 210 | 9. Explian the importance of sampling and how to successfully do it (Completed: ) 211 | 10. Research and explain the different types of cyber crimes (Completed: ) 212 | 213 | **** MICS104 - Facebook OSINT **** (6 Points) 214 | 215 | 1. Create covert social media accounts (Completed: ) 216 | 2. Search content by location on Facebook (Completed: ) 217 | 3. Search content posted by a given user on Facebook (Completed: ) 218 | 4. Find employees that work for a given employer on Facebook (Completed: ) 219 | 5. Create a Mindmap of all the OSINT data that can be captured from Facebook (Completed: ) 220 | 221 | **** MICS201 - Passive Network Reconnaissance **** (5 Points) 222 | 223 | 1. Use dnsdumpster.com to passively map an organizations external facing assets (Completed: ) 224 | 2. Use shodan.io to passively map an organization's external facing assets (Completed: ) 225 | 3. Use crt.sh to identify domains and sub-domains that belong to an organization (Completed: ) 226 | 4. Search for information leaks on Github using grep.app (Completed: ) 227 | 5. Use whoisds.com to retrieve recently registered domain names for a country (Completed: ) 228 | 229 | **** MICS202 - Discover Attack Campaigns **** (3 Points) 230 | 231 | 1. Detect typo squatting and phising with dnstwist.py (Completed: ) 232 | 2. Use urlscan.io to identify phishing and spear-phising websites (Completed: ) 233 | 3. Create Google searches to find open Cuckoo Sandboxes (Completed: ) 234 | 235 | **** MICS203 - Operational Security **** (5 Points) 236 | 237 | 1. Lab Setup: Cloud Vm for Threat Intelligence (Completed: ) 238 | 2. Conduct a safe port scan of a host (Completed: ) 239 | 3. Conduct a safe nslookup of a domain (Completed: ) 240 | 4. Conduct a safe HTTP request against a mockup attacker infrastructure (Completed: ) 241 | 5. Safely conduct banner grab of ports on a host (Completed: ) 242 | 243 | **** MICS301 - Microsoft Windows Fundamentals **** (5 points) 244 | 245 | 1. Use PE Studio to analyse 5 files on your computer (Completed: ) 246 | 2. Use TCPView to identify open ports and network services (Completed: ) 247 | 3. Use Process Hacker to investigate running processes (Completed: ) 248 | 4. Use ranas.exe to excute a process as another user (Completed: ) 249 | 5. Use PsExec to gain SYSTEM privledges on your machine (Completed: ) 250 | 251 | **** MICS 302 - Security Tools **** 8 points 252 | 253 | 1. Brute Force web directories and files using WFUZZ (Completed: ) 254 | 2. Use sslscan to access the SSL configuration setting of HTTPS websites (Completed: ) 255 | 3. Perform a TCP port scan using Nmap (Completed: yes) 256 | 4. perform a UDP port scan using Nmap (Completed: yes) 257 | 5. Use NMAP to print the readable strings from service fingerprints of unkown services (Completed: ) 258 | 6. Extract HTML and JavaScropt comments from HTTP response (Completed: ) 259 | 7. Use sublist3r.py to perform subdomain enumeration (Completed: ) 260 | 8. Dump the RAM of a Windows Machine (Completed: ) 261 | 262 | 263 | ****MICS303 - Governance, Risk and Complaince **** (5 Points) 264 | 265 | 1. Research and Explain how a penetration test should be conducted (1 Point) 266 | 2. Write a simple Risk Matrix (1 Point) 267 | 3. Write a multiple Security Awareness Posters (1 point) 268 | 4. Write a Password Policy (1 Points) 269 | 5. Write an Assest Inventory Spreadsheet Template (1 Point) 270 | 271 | 272 | Series Three Solid 273 | 274 | NICE Framwork 275 | 1. Knowledge of computer neetworking concepts and protocols, and network security methodologies 276 | 2. knowledge of risk management processes. 277 | 278 | --------------------------------------------------------------------------------