1 |
VM Setup (Kali, Metasploitable2) |
Set up Kali and Metasploitable2 on your computer and take a brief tour in advance of future labs. |
1/14/2025 |
1/21/2025 at 11:59pm |
2 |
Reconnaissance |
Perform reconnaissance on the University of the Pacific using a variety of publicly available websites and open source software tools. |
1/23/2025 |
1/29/2025 at 11:59pm |
3 |
Scanning with Nmap |
Use Nmap to scan the Metasploitable2 system to detect open ports, applications, and versions. |
1/30/2025 |
2/5/2025 at 11:59pm |
4 |
Vulnerability Scanning |
Use a vulnerability scanner (Nessus or OpenVAS) to scan the Metasploitable2 system for specific vulnerabilities |
2/6/2025 |
2/12/2025 at 11:59pm |
5 |
Exploitation |
Use Metasploit to actively exploit vulnerabilities in the Metasploitable2 VM and gain access |
2/13/2025 |
2/19/2025 at 11:59pm |
6 |
Post-Exploitation |
Explore a system after exploitation gains initial access |
2/20/2025 |
2/26/2025 at 11:59pm |
7 |
XP Cyber - Password Testing |
Vulnerability Assessment Analyst - Penetration Testing: Bringing Passwords Up To Snuff |
2/27/2025 |
3/5/2025 at 11:59pm |
8 |
Social Engineering |
Demonstrate different categories of social engineering attacks through the Social Engineering Toolkit |
3/6/2025 |
3/17/2025 at 11:59pm |
9 |
XP Cyber - "Professor Shafer Special" |
Use Metasploit to target Microsoft Windows Systems |
3/16/2025 |
3/24/2025 at 11:59pm |
.. |
.. |
.. |
.. |
.. |