TryHackMe
Vulnversity - TryHackMe Room
In this room, we will walk through a basic machine using various techniques from scanning with nmap, directory busting with Gobuster and utilizing some privilege escalation techniques.
Linux Privilege Escalation
In this room, we will walk through a variety of Linux Privilege Escalation techniques - ranging from weak file permissions and cron jobs to environment variables and SUID executables
Common Linux Privilege Escalation
In this room, we will give an introduction to some common linux privilege escalation techniques such as SUID/GUID files, /etc/passwd file, and crontabs
What the Shell? - TryHackMe Room
In this room, we will give an introduction to shells, what they are, sending and receiving (reverse/bind) shells when exploiting target machines.
Blue - TryHackMe Room Writeup
In this room, we will exploit a Windows machine using the famous EternalBlue exploit which uses an exploit present in SMBv1 revealed by the Shadow Brokers.
Metasploit - TryHackMe Room
In this room, we will learn how to use Metasploit - an incredible popular framework used by security professionals used to probe and exploit vulnerabilities.
Active Directory Basics Room
In this room, we will give an introduction to Active Directory - a staple in modern networks and widely used in large corporate networks.
Intro to Windows - TryHackMe Room
In this room, we will look at an introduction to the Windows OS including a little history, authentication processes, types of servers and GPOs.
Encryption - Cryptography 101
In this room, we will cover various things including why cryptography matters, RSA, two main classes of cryptography and their uses, key exchange.
John the Ripper - TryHackMe Room
In this room, you will learn how to use John the Ripper - an incrediblly powerful and adaptable tool for cracking hashes and passwords
Hashing - Crypto 101 Room
This room serves as an introduction to Hashing, as part of the cryptography series of rooms in the Complete Beginner Learning Path
Pickle Rick
In this room, we will exploit a webserver to find 3 ingredients that will help Rick make his potion to transform himself back into a human from a pickle
Upload Vulnerabilities Room
The purpose of this room is to explore some of the vulnerabilities resulting from improper (or inadequate) handling of file uploads
OWASP Juice Shop Room
This room looks at OWASP's top 10 vulnerabilities in web applications using OWASP's own creation called Juice Shop to get more experience with web app pentesting
OWASP Top 10 Web Vulnerabilities
This room breaks each OWASP topic down and includes details on what the vulnerability is, how it occurs and how you can exploit it effectively.
Burp Suite Basics Room
This room is designed for you to learn the basics and major components of Burp Suite, the de facto tool to use when performing web app testing.
Web Fundamentals Room
This room is designed as a basic intro to how the web works. It covers HTTP requests and responses, web servers, cookies and then a mini CTF at the end.
Network Services 2 - More Services
This room is a direct sequel to the first Network Services room. It explores more common network services and their vulnerabilities you will likely find in the real world.
Network Services - Common Services
This room explores common Network Service vulnerabilities and misconfigurations on services such as SMB, Telnet and FTP - both explaining and exploiting.
Nmap Basics - Network Scanning
This room covers the most important tool a hacker can learn - Nmap. You will learn different types of scans, scripts and firewall evasion