Cyber Security University
Free educational resources that focus on learning by doing.
Contents
Free Beginner Red Team Path
Level 3 - Crypto & Hashes with CTF practice
Level 4 - Web
Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.
A beginner-level LFI challenge.
Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers.
This room uses the OWASP juice shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.
What happens when some broke CompSci students make a password manager.
Can you hack into the Year of the Rabbit box without falling down a hole.
Boot2root machine for FIT and bsides Guatemala CTF.
Boot-to-root originally designed for Securi-Tay 2020.
Bolt themed machine to root into.
Level 5 - Reverse Engineering & Pwn
Introduction to x64 Assembly on Windows.
This room teaches the basics of ghidra.
This room teaches the basics of radare2.
This room focuses on teaching the basics of assembly through reverse engineering.
Room for beginner Reverse Engineering CTF players.
Reverse engineering router firmware.
Introduction to popular pwn tools framework.
Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package.
Level 6 - PrivEsc
A tutorial room exploring CVE-2019-14287 in the Unix Sudo Program. Room One in the SudoVulns Series.
A tutorial room exploring CVE-2019-18634 in the Unix Sudo Program. Room Two in the SudoVulns Series.
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
Students will learn how to escalate privileges using a very vulnerable Linux VM.
Students will learn how to escalate privileges using a very vulnerable Windows 7 VM.
Metasploit Framework to get a foothold.
A new start-up has a few security issues with its web server.
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
Another beginner-level CTF challenge.
Rick and Morty themed LFI challenge.
Free Beginner Blue Team Path
Level 1 - Tools
Intro to Windows.
Intro to nessus scan.
Intro to Mitre attack framework.
Intro to honeypots.
Learn how to use Redline to perform memory analysis and scan for IOCs on an endpoint.
Use Autopsy to investigate artifacts from a disk image.
Level 2 - Security Operations, Incident Response & Threat Hunting
Investigating Windows.
A popular juice shop has been breached! Analyze the logs to see what had happened.
Apply your analytical skills to analyze the malicious network traffic using Wireshark.
Squid game-themed CTF.
Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information.
An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.