Lab Setup – Ethical Hacking [ earn 25 points]

Setting up a lab environment for ethical hacking is an important step for learning and practicing ethical hacking techniques without causing damage or harm to real-world systems. Here are some steps to consider when setting up an ethical hacking lab: Setting up a lab environment for ethical hacking can be a valuable learning experience, but … Read more

Web App Pentesting [ earn 90 points]

Web application penetration testing, also known as web app pentesting, is the process of evaluating the security of web applications by simulating an attack from a malicious actor. Web applications are a common target for attackers, as they can provide access to sensitive data, systems, and networks. Here are some steps involved in web app … Read more

Advanced Exploitation [ earn 105 points]

Advanced exploitation refers to the process of identifying and exploiting vulnerabilities in software and computer systems beyond basic or common techniques. This can involve the use of sophisticated techniques and tools, as well as a deep understanding of computer systems and security. Some examples of advanced exploitation techniques include: Advanced exploitation requires a deep understanding … Read more

Network Sniffing and Network Monitoring [ earn 30 points]

Network sniffing and network monitoring are two related but distinct processes used for network analysis and troubleshooting. Here’s a brief overview of each: Network sniffing, also known as packet sniffing or protocol analysis, involves capturing and analyzing network traffic to gain insight into the behavior of a network. This can be used to identify and … Read more

Code Level – Hacktivity [ earn 120 points]

Hacktivity at the code level refers to the process of identifying and exploiting vulnerabilities in source code, which can lead to security breaches and other types of cyberattacks. Here are some tools and techniques that are commonly used for hacktivity at the code level: Hacktivity at the code level requires a deep understanding of software … Read more

Linux Commands Walkthrough [ earn 75 points]

Linux is a popular operating system used by many developers, system administrators, and other tech professionals. Here are some common Linux commands and their uses: These are just a few examples of the many Linux commands that are available. Learning how to use these commands and others can be helpful for managing and navigating the … Read more

Tool Based – Hacktivity [ earn 270 points]

Hacktivity is a term used to describe the activity of ethical hackers who use their skills to identify and report security vulnerabilities in computer systems, websites, and networks. This activity can be facilitated by various tools, some of which are: Ethical hackers use these tools and others to identify vulnerabilities and security issues, which they … Read more

OSINT – Open Source Intelligence [ earn 50 points]

Open Source Intelligence (OSINT) refers to the collection, analysis, and dissemination of information from publicly available sources. This can include a wide range of sources such as social media, news articles, blogs, government reports, academic research, and public records. The purpose of OSINT is to gather information that can be used to support decision-making, identify … Read more

Web Archive: Internet Library [ earn 5 points]

The Web Archive, also known as the Internet Archive, is a digital library that aims to provide universal access to knowledge through its vast collection of archived web pages, books, videos, music, and other digital materials. The Web Archive was founded in 1996 and has since grown to become one of the largest archives of … Read more