# Start

If you are looking for a practical hands-on cybersecurity education in switzerland, check-out this certificate of advanced studies course: <https://www.ost.ch/de/weiterbildung/weiterbildungsangebot/informatik/cas-cyber-security>

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FvYUJC2S0HwtCA9eN0tn2%2Fpentest_zoo.png?alt=media\&token=a5c7f1d4-a28c-44de-89a7-a52d6e3febd4)

### Hacking-Lab Live CD

Most exercises can be done with the Hacking-Lab live CD. It's a modified version of Kali Linux developed by [compass security](https://www.compass-security.com/en/).

{% embed url="<https://livecd.hacking-lab.com>" %}

### Alternative Live CD

{% embed url="<https://www.kali.org/get-kali#kali-virtual-machines>" %}

{% embed url="<https://www.parrotsec.org/download/>" %}

### Changing History

<table><thead><tr><th width="156" align="center">Date</th><th>Description</th></tr></thead><tbody><tr><td align="center"><strong>20.10.21</strong></td><td><p>Chapter <a href="ctf-and-crypto-exercises">Crypto Exercises</a> added</p><p><a href="ctf-and-crypto-exercises/cyberchef-challenge">Cyberchef Challenge</a> added</p></td></tr><tr><td align="center"><strong>21.10.21</strong></td><td><p><a href="ctf-and-crypto-exercises/htb-invite-challenge">HTB Invite Challenge</a> added</p><p><a href="ctf-and-crypto-exercises/bsides-london-2019-challenge">Bsides London 2019 Ticket Challenge</a> added</p></td></tr><tr><td align="center"><strong>14.11.21</strong></td><td><p>Chapter <a href="windows-hacking">Windows Hacking</a> added</p><p><a href="windows-hacking/throwback-network">Throwback Network Challenge</a> added </p></td></tr><tr><td align="center"><strong>19.11.21</strong></td><td><a href="man-in-the-middle/rdp-mitm-exercise">RDP MitM Exercise</a> added</td></tr><tr><td align="center"><strong>06.02.22</strong></td><td><a href="windows-hacking/winattack-lab">WinAttack Lab Exercises</a> added</td></tr><tr><td align="center"><strong>07.02.22</strong></td><td><a href="exploitation/redis-server">Redis Server Exercise</a> added<br><a href="exploitation/print-nightmare">Print Nightmare Exercise</a> added<br><a href="exploitation/baron-samedit">Baron Samedit Exercise</a> added</td></tr><tr><td align="center"><strong>07.02.22</strong></td><td>Chapter <a href="threat-intelligence">Threat Intelligence</a> added</td></tr><tr><td align="center"><strong>08.02.22</strong></td><td><a href="threat-intelligence">MISP Exercises</a> 1-4 added<br><a href="threat-intelligence">MISP Exercises</a> 5-8 added</td></tr><tr><td align="center"><strong>09.02.22</strong></td><td>Chapter <a href="forensic-exercises">Forensic Exercises</a> added<br><a href="forensic-exercises/image-forensics/unswirl-image">Unswirl Image Challenge</a> added</td></tr><tr><td align="center"><strong>11.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/the-sleuth-kit-intro">The Sleuth Kit Intro Exercise</a> added</td></tr><tr><td align="center"><strong>12.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/filecarving-with-foremost">Filecarving with foremost Exercise</a> added<br><a href="forensic-exercises/disk-forensics/filecarving-with-scalpel">Filecarving with scalpel Exercise</a> added<br><a href="forensic-exercises/disk-forensics/bulk-extractor">Bulk extractor Exercise</a> added<br><a href="forensic-exercises/disk-forensics/disk-acquisition-with-dd">Disk acquisition with dd Exercise</a> added</td></tr><tr><td align="center"><strong>13.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/disk-acquisition-with-dcfldd">Disk acquisition with dcfldd Exercise</a> added<br><a href="forensic-exercises/disk-forensics/disk-acquisition-with-ewftools">Disk acqusition with ewf-tools Exercise</a> added</td></tr><tr><td align="center"><strong>15.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/disk-acquisition-with-ftk-imager">Disk acquisition with FDK Imager Exercise</a> added<br><a href="forensic-exercises/disk-forensics/mount-disk-image-raw">Mount disk image (raw) Exercise</a> added</td></tr><tr><td align="center"><strong>19.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/unknown-usb-stick">Unknown USB Stick Exercise</a> added<br><a href="forensic-exercises/windows-forensics/bitunlocker">Bitunlocker Exercise</a> added</td></tr><tr><td align="center"><strong>20.02.22</strong></td><td><a href="forensic-exercises/disk-forensics/usb-stick-filecarving">USB Stick Filecarving Exercise</a> added</td></tr><tr><td align="center"><strong>22.02.22</strong></td><td><a href="forensic-exercises/mail-header-analysis">Mailheader Analysis Exercise</a> added<br><a href="forensic-exercises/timestomping-exercise">Timestomping Exercise</a> added</td></tr><tr><td align="center"><strong>23.02.22</strong></td><td><a href="forensic-exercises/memory-forensics/volatility2-basics-linux">Volatility Basics Exercise</a> added</td></tr><tr><td align="center"><strong>26.02.22</strong></td><td><a href="forensic-exercises/memory-forensics/volatility2-exercise-1">Volatility Exercise 1</a> added</td></tr><tr><td align="center"><strong>27.02.22</strong></td><td><a href="forensic-exercises/image-forensics/manual-filecarving-1">Manual Filecarving Exercise 1</a> added</td></tr><tr><td align="center"><strong>28.02.22</strong></td><td><a href="forensic-exercises/image-forensics/manual-filecarving-2">Manual Filecarving Exercise 2</a> added<br><a href="forensic-exercises/disk-forensics/autopsy-exercise">Autopsy Exercise</a> added</td></tr><tr><td align="center"><strong>09.03.22</strong></td><td>Chapter <a href="malware-analysis">Malware Analysis</a> added<br><a href="malware-analysis/ransomware/general-introduction">Ransomware Introduction</a> added<br><a href="malware-analysis/ransomware/ryuk">Ryuk Exercise</a> added</td></tr><tr><td align="center"><strong>20.03.22</strong></td><td><a href="ctf-and-crypto-exercises/ninja-sec-challenge">Ninja-Sec Challenge</a> added</td></tr><tr><td align="center"><strong>28.03.22</strong></td><td><a href="web-application-security/dvwa/dvwa-exercises-4">DVWA Exercises</a> added</td></tr><tr><td align="center"><strong>07.04.22</strong></td><td><a href="malware-analysis/ransomware/ransomexx">RansomEXX Exercise</a> added<br><a href="malware-analysis/ransomware/revil">REvil Exercise</a> added<br><a href="malware-analysis/ransomware/blackmatter">BlackMatter Exercise</a> added</td></tr><tr><td align="center"><strong>08.04.22</strong></td><td><a href="malware-analysis/ransomware/hades">HADES Exercise</a> added<br><a href="malware-analysis/ransomware/egregor">Egregor Exercise</a> added<br><a href="malware-analysis/ransomware/doppelpaymer">DoppelPaymer Exercise</a> added<br><a href="exploitation/polkit">Polkit Exercise</a> added</td></tr><tr><td align="center"><strong>11.04.22</strong></td><td>Chapter <a href="forensic-readiness">Forensic Readiness</a> added<br><a href="forensic-readiness/windows-event-logs">Windows Event Log Exercise</a> added<br><a href="forensic-readiness/windows-sysmon">Windows Sysmon Exercise</a> added</td></tr><tr><td align="center"><strong>13.04.22</strong></td><td><a href="forensic-readiness/sysmon-capture-clipboard">Sysmon:Capture Clipboard Exercise </a>added</td></tr><tr><td align="center"><strong>23.04.22</strong></td><td><a href="forensic-readiness/sysmon-process-injection">Sysmon: Process Injection Exercise</a> added</td></tr><tr><td align="center"><strong>24.04.22</strong></td><td>Chapter <a href="malware-analysis/yara">YARA</a> added<br><a href="malware-analysis/yara/yara-install">YARA Install Exercise</a> added</td></tr><tr><td align="center"><strong>25.04.22</strong></td><td><a href="malware-analysis/yara/yargen">yarGen Exercise</a> added</td></tr><tr><td align="center"><strong>30.04.22</strong></td><td><a href="malware-analysis/yara/yara-with-cyberchef">YARA with Cyberchef Exercise</a> added</td></tr><tr><td align="center"><strong>01.05.22</strong></td><td><a href="malware-analysis/yara/tcp-dump-analysis">TCP Dump analysis Exercise</a> added</td></tr><tr><td align="center"><strong>04.05.22</strong></td><td><a href="malware-analysis/dosfuscated-scripts">Examples of Dosfuscated Scripts</a> added</td></tr><tr><td align="center"><strong>05.05.22</strong></td><td><a href="malware-analysis/yara/memory-dump-analysis">Volatility Memorydump Exercise with yara</a> added</td></tr><tr><td align="center"><strong>15.05.22</strong></td><td>Chapter <a href="forensic-exercises/network-forensics">Network Forensics</a> added<br><a href="forensic-exercises/network-forensics/tshark-exercise">Tshark Exercise</a> added</td></tr><tr><td align="center"><strong>16.05.22</strong></td><td><a href="threat-intelligence/virus-total-graph-exercise">Virus Total Graph Exercise</a> added<br><a href="threat-intelligence/rfi-incoming">RFI Incoming! Exersise</a> added</td></tr><tr><td align="center"><strong>23.05.22</strong></td><td><a href="live-response">Chapter Live Response</a> added<br><a href="live-response/velociraptor-p1">Velociraptor P1 Exercise</a> added</td></tr><tr><td align="center"><strong>24.05</strong>.<strong>22</strong></td><td><a href="live-response/velociraptor-p2">Velociraptor P2 Exercise</a> added</td></tr><tr><td align="center"><strong>26.05.22</strong></td><td><a href="live-response/velociraptor-p3">Velociraptor P3 Exercise</a> added</td></tr><tr><td align="center"><strong>30.05.22</strong></td><td><a href="live-response/windows-response-lab">Chapter Windows Response LAB</a> added<br><a href="live-response/windows-response-lab/lateral-movement-detection">Lateral Movement Detection Exercise</a> added<br><a href="live-response/windows-response-lab/detect-persistence">Detect Persistence Exercise</a> added<br><a href="live-response/windows-response-lab/volatility-analysis">Volatility Analysis Exercise</a> added</td></tr><tr><td align="center"><strong>31.05.22</strong></td><td><a href="forensic-exercises/memory-forensics/volatility3-exercise-1">Volatility3 Exercise</a> added</td></tr><tr><td align="center"><strong>04.06.22</strong></td><td><a href="forensic-exercises/memory-forensics/volatility3-exercise-2">Volatility3 Exercise 2</a> added<br><a href="forensic-exercises/memory-forensics/volatility3-exercise-3">Volatility3 Exercise 3</a> added</td></tr><tr><td align="center"><strong>06.06.22</strong></td><td><a href="forensic-readiness/ransomware-detection/signature-based">Signature based Ransomware detection</a> added</td></tr><tr><td align="center"><strong>13.06.22</strong></td><td>Chapter <a href="android-malware">Android Malware</a> added</td></tr><tr><td align="center"><strong>20.06.22</strong></td><td>Android LAB <a href="android-malware/lab-setup-1">Setup 1</a> added</td></tr><tr><td align="center"><strong>21.06.22</strong></td><td>Android LAB <a href="android-malware/lab-setup-2">Setup 2</a> added</td></tr><tr><td align="center"><strong>23.06.22</strong></td><td><a href="android-malware/android-permissions">Android permission Exercise</a> added</td></tr><tr><td align="center"><strong>30.06.22</strong></td><td><a href="android-malware/app-tracing-with-frida">App tracing with frida</a> Exercise added</td></tr><tr><td align="center"><strong>01.07.22</strong></td><td><a href="android-malware/aes-key-decryption">AES Key decryption Exercise</a> added</td></tr><tr><td align="center"><strong>05.07.22</strong></td><td><a href="android-malware/redalert">Android RedAlert Exercise</a> added</td></tr><tr><td align="center"><strong>07.07.22</strong></td><td><a href="android-malware/blackroselucy">BlackRoseLucy Exercise</a> added<br><a href="android-malware/crackme-re-challenge">Crackme Challenge</a> added</td></tr><tr><td align="center"><strong>14.08.22</strong></td><td><a href="web-application-security/dvwa/dvwa-exercises-5">DVWA Exercises 5</a> expanded<br><a href="web-application-security/dvwa/dvwa-exercises-6">DVWA Exerxices 6</a> added<br><a href="web-application-security/dvwa/dvwa-exercises-7">DVWA Exercises 7</a> added</td></tr><tr><td align="center"><strong>15.08.22</strong></td><td><a href="web-application-security/dvwa/dvwa-exercises-8">DVWA Exercises 8</a> added</td></tr><tr><td align="center"><strong>11.12.22</strong></td><td><a href="exploitation/heartbleed">Heartbleed Exercise</a> added</td></tr></tbody></table>

### Table of Contents

[Reconnaissance](https://cas-cyber.gitbook.io/cas-cybersecurity/master)

[Docker basics and Images](https://cas-cyber.gitbook.io/cas-cybersecurity/docker-basics)

[Scanning and Enumeration](https://cas-cyber.gitbook.io/cas-cybersecurity/scanning-and-enumeration)

[Vulnerability Scanning and Analysis](https://cas-cyber.gitbook.io/cas-cybersecurity/vulnerability-scanning-and-analysis)

[Exploitation](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation)

[Man in the Middle](https://cas-cyber.gitbook.io/cas-cybersecurity/man-in-the-middle)

[Windows Hacking](https://cas-cyber.gitbook.io/cas-cybersecurity/windows-hacking)

[Web Application Security](https://cas-cyber.gitbook.io/cas-cybersecurity/web-application-security)

[CTF and Crypto Exercises](https://cas-cyber.gitbook.io/cas-cybersecurity/ctf-and-crypto-exercises)

[Threat Intelligence](https://cas-cyber.gitbook.io/cas-cybersecurity/threat-intelligence)

[Forensic Exercises](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-exercises)

[Malware Analysis](https://cas-cyber.gitbook.io/cas-cybersecurity/malware-analysis)

[Android Malware](https://cas-cyber.gitbook.io/cas-cybersecurity/android-malware)

[Forensic Readiness](https://cas-cyber.gitbook.io/cas-cybersecurity/forensic-readiness)

[Live Response](https://cas-cyber.gitbook.io/cas-cybersecurity/live-response)
