# Wargamming
## Módulo 02
<!-- Put the link to this slide here so people can follow -->
slide: https://bit.ly/3XznEFq

---
# Contents
- Threat Actors
- Types of Testing
- Bind shells and Reverse Shells
- Tunneling Exploits thought SSH
- Metasploitable2 VM Walkthrough
- Tools and Methodologies
---
# Threat Actors
<!-- https://www.redlegg.com/blog/cyber-threat-actor-types -->
- Cyberterrorists
- Government-Sponsored/State-Sponsored Actors
- Organized Crime/Cybercriminals
- Hacktivists
- Insiders
- Script Kiddies
- Internal User Errors
---
# Hats

[+ Info](https://https://sectigostore.com/blog/different-types-of-hackers-hats-explained/)
<!--
https://sectigostore.com/blog/different-types-of-hackers-hats-explained/
-->
---
# Common Threat Actor Motivations
- Political, Economic, Technical, and Military Agendas
- Profits/Financial Gain
- Notoriety
- Revenge
- Overlap of Motivations
[+Info](https://www.redlegg.com/blog/cyber-threat-actor-types)
---
# Types of Testing
<!-- Falar sobre Black Box, gray box, and whitebox -->
- BlackBox
- GrayBox
- WhiteBox
---
# Bind shells and Reverse Shells

---
# Bind shells and Reverse Shells

[+ Info](https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/)
<!--
https://www.geeksforgeeks.org/difference-between-bind-shell-and-reverse-shell/
https://securityatoz.com/difference-between-binds-hell-and-reverse-shell/
https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
Videos ??
https://zsecurity.org/hacking-101-bind-shell-vs-reverse-shell/
-->
---
# Tunneling Exploits thought SSH
Play demonstration video
---
# Metasploitable2 VM Walkthrough
Power up metasploite2 VM and Kali.
Let's go step by step
<!--
https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/
https://www.hackingtutorials.org/metasploit-tutorials/metasploitable-2-enumeration/
https://www.hackingtutorials.org/metasploit-tutorials/hacking-unreal-ircd-3-2-8-1/
https://www.hackingtutorials.org/metasploit-tutorials/metasploitable-2-vulnerability-assessment/
https://www.hackingarticles.in/comprehensive-guide-on-metasploitable-2/
https://www.tutorialspoint.com/metasploit/metasploit_quick_guide.htm
-->
---
# Tools and Methodology
- Main Tools
- nmap
- metasploit
- openvas
- burp
- zap
- sqlmap
- hydra
- searchsploit
- armitage
---
<!--
# Test asccinema
{%youtube lbJngSfp56Y %}
[Asciinema](https://asciinema.org/a/412154.js)
---
-->
{"metaMigratedAt":"2023-06-17T15:22:00.990Z","metaMigratedFrom":"YAML","title":"Wargamming Modulo 2","breaks":true,"description":"View the slide with \"Slide Mode\".","contributors":"[{\"id\":\"7794f198-59db-4523-96c3-a61188501245\",\"add\":5368,\"del\":2592}]"}