Tag Archives: CYBER.ORG

CYBER.ORG – 1.2.6 – Bots and Botnets & Case Study – Botnet

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentation: 1.2.6 – Bots and Botnets.pptx
  • See PDF Document: Case Study – Botnet

Assignment:

  1. Begin reading the 1.2.6 – Bots and Botnets.pptx presentation.
  2. Read the Case Study – Botnet.pdf document and be prepared to answer the questions at the end.
  3. Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Tuesday.

Assigned: April 24th, 2023
Teacher Pacing Due Date: April 25th, 2023

CYBER.ORG – 1.3.7 – Replay Attacks and Pass the Hash & Lab – Pass the Hash

Objective: Given a scenario, the student will analyze potential
indicators associated with application attacks.

Resources:

  • See PowerPoint presentations: 1.3.7 – Replay Attacks and Pass the Hash.pptx, and Lab – Pass the Hash.pptx

Assignment:

  1. Begin by reading the 1.3.7 – Replay Attacks and Pass the Hash.pptx presentation.
  2. Read and complete the lab activity in the Lab – Pass the Hash.pptx document.
  3. To confirm completion the lab activity, upload a screenshot with today’s date showing the results of the getuid and sysinfo commands demonstrating that you have Administrator-level access in the Windows 7 environment to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: April 18th, 2023
Teacher Pacing Due Date: April 19th, 2023

CYBER.ORG – 1.3.1 – Privilege Escalation & Lab – Privilege Escalation

Objective: Given a scenario, the student will analyze potential
indicators associated with application attacks.

Resources:

  • See PowerPoint presentations: 1.3.1 – Privilege Escalation.pptx, and Lab – Privilege Escalation.pptx

Assignment:

  1. Begin by reading the 1.3.1 – Privilege Escalation.pptx presentation.
  2. Read and complete the lab activity in the Lab – Privilege Escalation.pptx document.
  3. To confirm completion the lab activity, upload a screenshot of the Meterpreter session with the escalated privileges that demonstrates that you have Administrator-level access to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: April 12th, 2023
Teacher Pacing Due Date: April 12th, 2023

CYBER.ORG – Lab – Keylogger Application

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: Lab – Keylogger Application.pptx

Assignment:

  1. Read and complete the lab activity in the Lab – Keylogger Application.pptx document.
  2. This lab is similar to the Intro to Keyloggers lab we did last week, but it uses a different, non-Java based application to harvest keystrokes.
  3. To do this, you will need to activate a backdoor session. Follow the steps at the end of the Powerpoint document to quickly establish a backdoor session on the vulnerable Windows 7 machine, then proceed with the steps to locate and shut down the active backdoor session using the available tools within Windows.
  4. To confirm completion the lab activity, activate the keylogger, then visit https://netop.mistermarmolejo.com in the Vulnerable Windows 7 environment while the keylogger is active. Upload a screenshot of the Meterpreter session showing the captured keystrokes of your visit to the Netop website to today’s Google Classroom post.
  5. Please do your best to complete this Lab by the end of the class period today.

Assigned: April 10th, 2023
Teacher Pacing Due Date: April 11th, 2023

CYBER.ORG – Lab – Backdoor Removal

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: Lab – Backdoor Removal.pptx

Assignment:

  1. Read and complete the lab activity in the Lab – Backdoor Removal.pptx document.
  2. This lab will walk you through the process of locating and removing an active backdoor session.
  3. To do this, you will need to activate a backdoor session. Follow the steps at the end of the Powerpoint document to quickly establish a backdoor session on the vulnerable Windows 7 machine, then proceed with the steps to locate and shut down the active backdoor session using the available tools within Windows.
  4. To confirm completion the lab activity, upload a screenshot of both the active Meterpreter Attack session that shows the backdoor session in action, and the TimeoutError messages demonstrating that the attack has been terminated to today’s Google Classroom post.
  5. Please do your best to complete this Lab by the end of the class period on Friday.

Assigned: April 5th, 2023
Teacher Pacing Due Date: April 6th, 2023

CYBER.ORG – 1.2.9 – Keyloggers & Lab – Intro to Keyloggers

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: 1.2.9 – Keyloggers.pptx, and Lab – Intro to Keyloggers.pptx

Assignment:

  1. Begin by reading the 1.2.9 – Keyloggers.pptx presentation.
  2. Read and complete the lab activity in the Lab – Intro to Keyloggers.pptx document.
  3. To confirm completion the lab activity, upload a screenshot of the Javascript Keylogger Attack window that demonstrates the recorded keystrokes to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: April 4th, 2023
Teacher Pacing Due Date: April 5th, 2023

CYBER.ORG – 1.2.3 – Trojans, Backdoors, and RATs, Lesson 4.1.6 – Exploitation Frameworks & Lab – Backdoor

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack, and use the appropriate tool to assess organizational security. .

Resources:

  • See PowerPoint presentations: 1.2.3 – Trojans, Backdoors, and RATs.pptx,  4.1.6 – Exploitation Frameworks.pptx, and Lab – Backdoor.pptx

Assignment:

  1. Begin by reading the 1.2.3 – Trojans, Backdoors, and RATs.pptx and  4.1.6 – Exploitation Frameworks.pptx presentations.
  2. Read and complete the lab activity in the Lab – Backdoor.pptx document.
  3. To confirm completion the lab activity, upload a screenshot (with today’s date) of the open meterpreter session that activates on the Kali system when the trojan payload is activated in the Windows environment to today’s Google Classroom post.
  4. Please do your best to complete this Lab by the end of the class period on Wednesday.

Assigned: March 28th, 2023
Teacher Pacing Due Date: March 29th, 2023

CYBER.ORG – 1.2.2 – Ransomware and Crypto-Malware & Lab – Ransomware Attack

Objective: Given a scenario, the student will analyze potential
indicators to determine the type of attack.

Resources:

  • See PowerPoint presentations: 1.2.2 Ransomware and Crypto-Malware and Lab – Ransomware Attack.pptx

Assignment:

  1. Begin reading the 1.2.2 Ransomware and Crypto-Malware.pptx presentation.
  2. Read and complete the lab activity in the Lab – Ransomware Attack.pptx document.
  3. To confirm completion the lab activity, upload a screenshot of the activated Ransomware attack (with today’s date) to today’s Google Classroom post.
  4. Please note that upon completion of this lab, you will need me to reset your Windows 7 Virtual Environment. Please notify me when you are ready for me to reset the environment.
  5. Please do your best to complete this Lab by the end of the class period today.

Assigned: March 22nd, 2023
Teacher Pacing Due Date: March 22nd, 2023

CYBER.ORG – 1.2.1 – Malware & Case Study – Malware

Objective: Given a scenario, analyze indicators of compromise and determine the type of malware.

Resources:

  • See PowerPoint presentation: 1.2.1 Malware.pptx
  • See PDF Document: Case Study – Malware

Assignment:

  1. Begin reading the 1.2.1 Malware.pptx presentation.
  2. Read the Case Study – Malware 2023.pdf document and be prepared to answer the questions at the end.
  3. Answer the questions on the provided Google Form in today’s Google Classroom assignment post to receive credit by end of day on Wednesday.

Assigned: March 20th, 2023
Teacher Pacing Due Date: March 22nd, 2023

CYBER.ORG – 1.8.1 – Pentesting, 1.8.2 – Pentest Exercise Types & Case Study – Pen Testing

Objective:

The student will explain the techniques used in
penetration testing.

Resources:

  • See PowerPoint presentations 1.8.1 – Pentesting.pptx, 1.8.2 – Pentest Exercise Types.pptx, and PDF document Case Study – Pen Testing.pdf

Assignment:

  1. Begin reading the 1.8.1 – Pentesting.pptx and 1.8.2 – Pentest Exercise Types.pptx presentations.
  2. Familiarize yourself with the purpose of penetration testing and
    some different ways of conducting this testing.
  3. Read the Case Study – Pen Testing.pdf document and be prepared to answer the questions at the end.
  4. Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
  5. Please do your best to complete this Case Study by the end of the class period today. This Case Study will be the final assignment of the 3rd Term.

Assigned: March 8th, 2023
Teacher Pacing Due Date: March 8th, 2023