# Wargamming ## Módulo 02 <!-- Put the link to this slide here so people can follow --> slide: https://bit.ly/3XznEFq ![](https://i.imgur.com/oxzWczt.png =450x) --- # Contents - Threat Actors - Types of Testing - Bind shells and Reverse Shells - Tunneling Exploits thought SSH - Metasploitable2 VM Walkthrough - Tools and Methodologies --- # Threat Actors <!-- https://www.redlegg.com/blog/cyber-threat-actor-types --> - Cyberterrorists - Government-Sponsored/State-Sponsored Actors - Organized Crime/Cybercriminals - Hacktivists - Insiders - Script Kiddies - Internal User Errors --- # Hats ![](https://i.imgur.com/b19Q9GZ.png) [+ Info](https://https://sectigostore.com/blog/different-types-of-hackers-hats-explained/) <!-- https://sectigostore.com/blog/different-types-of-hackers-hats-explained/ --> --- # Common Threat Actor Motivations - Political, Economic, Technical, and Military Agendas - Profits/Financial Gain - Notoriety - Revenge - Overlap of Motivations [+Info](https://www.redlegg.com/blog/cyber-threat-actor-types) --- # Types of Testing <!-- Falar sobre Black Box, gray box, and whitebox --> - BlackBox - GrayBox - WhiteBox --- # Bind shells and Reverse Shells ![](https://i.imgur.com/npJs2dr.png) --- # Bind shells and Reverse Shells ![](https://i.imgur.com/OyMA4De.png) [+ Info](https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/) <!-- https://www.geeksforgeeks.org/difference-between-bind-shell-and-reverse-shell/ https://securityatoz.com/difference-between-binds-hell-and-reverse-shell/ https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/ Videos ?? https://zsecurity.org/hacking-101-bind-shell-vs-reverse-shell/ --> --- # Tunneling Exploits thought SSH Play demonstration video --- # Metasploitable2 VM Walkthrough Power up metasploite2 VM and Kali. Let's go step by step <!-- https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/ https://www.hackingtutorials.org/metasploit-tutorials/metasploitable-2-enumeration/ https://www.hackingtutorials.org/metasploit-tutorials/hacking-unreal-ircd-3-2-8-1/ https://www.hackingtutorials.org/metasploit-tutorials/metasploitable-2-vulnerability-assessment/ https://www.hackingarticles.in/comprehensive-guide-on-metasploitable-2/ https://www.tutorialspoint.com/metasploit/metasploit_quick_guide.htm --> --- # Tools and Methodology - Main Tools - nmap - metasploit - openvas - burp - zap - sqlmap - hydra - searchsploit - armitage --- <!-- # Test asccinema {%youtube lbJngSfp56Y %} [Asciinema](https://asciinema.org/a/412154.js) --- -->
{"metaMigratedAt":"2023-06-17T15:22:00.990Z","metaMigratedFrom":"YAML","title":"Wargamming Modulo 2","breaks":true,"description":"View the slide with \"Slide Mode\".","contributors":"[{\"id\":\"7794f198-59db-4523-96c3-a61188501245\",\"add\":5368,\"del\":2592}]"}
    491 views