Cyber Security University
Free educational resources that focus on learning by doing.
Contents
About
Free Beginner Red Team Path
Level 4 - Web
Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers.
This room uses the OWASP juice shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.
This room focuses on teaching the basics of assembly through reverse engineering.
Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package.
A tutorial room exploring CVE-2019-14287 in the Unix Sudo Program. Room One in the SudoVulns Series.
A tutorial room exploring CVE-2019-18634 in the Unix Sudo Program. Room Two in the SudoVulns Series.
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
Students will learn how to escalate privileges using a very vulnerable Linux VM.
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
Level 3 - Crypto & Hashes with CTF practice
Free Beginner Blue Team Path
Level 5 - Malware and Reverse Engineering
Level 1 - Tools
Level 2 - Security Operations, Incident Response & Threat Hunting
Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information.
An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).