Tag Archives: CYBER.ORG

CYBER.ORG: AP Cybersecurity – Lesson 2.4.12 – Lab Activity – Buffer Overflow

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Application Attacks
    • Injection
    • Buffer overflow
    • Forgery

Guiding Question:

What are some common application attacks including replay, privilege escalation and directory traversal and how can you defend against them?

Resources:

  • Lesson 2.4.12 – Application Attacks Pt 2.pptx and Lab – Buffer Overflow.pptx Presentations available on Google Classroom

Assignment:

  1. Review the Lesson 2.4.12 – Application Attacks Pt 2.pptx presentation, if necessary.
  2. Complete the Lab – Buffer Overflow.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying the Windows Desktop containing the “document_1” file, the “Malicious” folder and a Wordpad window with the “We have taken over your system” message, demonstrating the Windows 7 system has been successfully compromised to today’s Google Classroom post.

Assigned: November 25th, 2025
Teacher Pacing Due Date: November 26th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.12 – Application Attacks Part 2

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Application Attacks
    • Injection
    • Buffer overflow
    • Forgery

Guiding Question:

What are some common application attacks including injection, buffer overflow and forgery and how can you defend against them?

Resources:

  • Lesson 2.4.12 – Application Attacks Part 2.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.11 – Application Attacks Part 1.pptx presentation, in today’s class.
  2. Complete the Lab – Command Injection.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying your Windows system DVWA Command Injection window displaying the passwd file edited with today’s date (as demonstrated in Slide 14 of the Lab presentation) to today’s Google Classroom post.

Assigned: November 24th, 2025
Teacher Pacing Due Date: November 25th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.11 – Lab Activity – Directory Traversal

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Application Attacks
    • Replay
    • Privilege escalation
    • Directory traversal

Guiding Question:

What are some common application attacks including replay, privilege escalation and directory traversal and how can you defend against them?

Resources:

  • Lesson 2.4.11 – Application Attacks Part 1.pptx and Lab – Directory Traversal.pptx Presentations available on Google Classroom

Assignment:

  1. Review the Lesson 2.4.11 – Application Attacks Part 1.pptx presentation, if necessary.
  2. Complete the Lab – Directory Traversal.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying your Windows system web browser displaying the “Secret Message” you created (as demonstrated in Slide 15 of the Lab presentation) to today’s Google Classroom post.

Assigned: November 21st, 2025
Teacher Pacing Due Date: November 24th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.11 – Lab Activity – Pass the Hash

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Application Attacks
    • Replay
    • Privilege escalation
    • Directory traversal

Guiding Question:

What are some common application attacks including replay, privilege escalation and directory traversal and how can you defend against them?

Resources:

  • Lesson 2.4.11 – Application Attacks Part 1.pptx and Lab – Pass the Hash.pptx Presentations available on Google Classroom

Assignment:

  1. Review the Lesson 2.4.11 – Application Attacks Part 1.pptx presentation, if necessary.
  2. Complete the Lab – Pass the Hash.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying your successful administrative login in the Meterpreter session on the Kali Linux machine to today’s Google Classroom post.
    • Note: You will need to complete yesterday’s Privilege Escalation lab to locate the Windows Password Hashes for use in this lab!

Assigned: November 20th, 2025
Teacher Pacing Due Date: November 21st, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.11 – Application Attacks Pt 1

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Application Attacks
    • Replay
    • Privilege escalation
    • Directory traversal

Guiding Question:

What are some common application attacks including replay, privilege escalation and directory traversal and how can you defend against them?

Resources:

  • Lesson 2.4.11 – Application Attacks Part 1.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.11 – Application Attacks Part 1.pptx presentation in today’s class.
  2. Complete the Lab – Privilege Escalation.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying your successfully escalated privileges in the Meterpreter session on the Kali Linux machine to today’s Google Classroom post.

Assigned: November 19th, 2025
Teacher Pacing Due Date: November 20th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Application Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Application
    • Memory injection
    • Buffer overflow
    • Race conditions
      • Time-of-check (TOC)
      • Time-of-use (TOU)
    • Malicious Update

Guiding Question:

What are 3 application attacks that can occur by taking advantage of system memory?

Resources:

  • Lesson 2.3.1 – Application Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.1 – Application Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – iPhone Integer Overflow.pdf Activity in class using the materials provided in Google Classroom.

Assigned: November 18th, 2025
Teacher Pacing Due Date: November 19th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 4.1.2 – Wireless Devices

Objective:

  • Students will investigate methods of securing wireless devices.

Standards:

CompTIA Security+ SYO-701 Objective:
4.1 – Given a scenario, apply common security techniques to computing

  • Wireless devices
    • Installation considerations
      • Site surveys
      • Heat maps
  • Wireless security settings
    • Wi-Fi Protected Access 3 (WPA3)
    • AAA/Remote Authentication Dial-In User Service (RADIUS)
    • Cryptographic protocols
    • Authentication protocols

Guiding Question:

What are common methods to secure wireless devices?

Resources:

  • Lesson 4.1.2 – Wireless Devices.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 4.1.2 – Wireless Devices.pptx presentation in today’s class.
  2. Complete the Case Study – Wireless Jamming.pdf Activity in class using the materials provided in Google Classroom.

Assigned: November 17th, 2025
Teacher Pacing Due Date: November 18th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.10 – Wireless, On-Path, and Replay Attacks

Objective:

  • Students will analyze potential indicators associated with network attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Network Attacks
    • Wireless
    • On-path
    • Credential replay
    • Malicious codeware attacks

Guiding Question:

What are common wireless network attacks and how can you defend against them?

Resources:

  • Lesson 2.4.10 – Wireless, On-Path, and Replay Attacks.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.4.10 – Wireless, On-Path, and Replay Attacks.pptx presentation in today’s class.
  2. Complete the Lab – Session Replay.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot displaying your successful login to the DVWA session on the Kali Linux machine to today’s Google Classroom post.

Assigned: November 14th, 2025
Teacher Pacing Due Date: November 17th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.9 – DNS Attacks

Objective:

  • Students will analyze potential indicators associated with network attacks.

Standards:

CompTIA Security+ SYO-701 Objective:

2.4 – Given a scenario, analyze indicators of malicious activity

  • Network Attacks
    • Domain Name System (DNS) attacks

Guiding Question:

  • What are some common DNS attacks and how can you defend against them?

Resources:

Lesson 2.4.9 – DNS Attacks.pptx Presentation and 2.4.9 – DNS Attacks – Guided Notes – Fall 2025 Form available on Google Classroom

Assignment:

  1. Read through the Lesson 2.4.9 – DNS Attacks.pptx presentation in today’s class.
  2. Complete the 2.4.9 – DNS Attacks – Guided Notes – Fall 2025 Form using the materials provided.

Assigned: November 13th, 2025
Teacher Pacing Due Date: November 14th, 2025

CYBER.ORG: AP Cybersecurity – Lesson 2.4.8 – DoS and DDoS Lab Activity

Objective:

  • Students will analyze potential indicators associated with network attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.4 – Given a scenario, analyze indicators of malicious activity

  • Network Attacks
    • Distributed denial-of-service (DDoS)
      • Amplified
      • Reflected

Guiding Question:

What are 3 types of DDoS attacks and how can you defend against them?

Resources:

  • 2.4.8 – DoS and DDoS.pptx and Lab – Denial of Service.pptx Presentations available on Google Classroom

Assignment:

  1. Review the 2.4.8 – DoS and DDoS.pptx presentation.
  2. Complete the Lab – Denial of Service.pptx Activity in class using the materials provided in Google Classroom.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the exploit running in the Terminal window on the Kali system confirming that the Victim’s Windows 7 system “seems down” from the active Metasploit session in the Kali environment to today’s Google Classroom post.

Assigned: November 12th, 2025
Teacher Pacing Due Date: November 13th, 2025