tiger-dev-hacker

@tiger-dev-hacker

Joined on Sep 15, 2023

  • Lab-9 Instructions Step 1: Track who is tracking you online Install or add a browser add-on Disconnect. This add-on is available for Google Chrome, Mozilla Firefox and Opera browsers. After installing the extension, visit the following web sites and check who is tracking you online with the Disconnect tool. Website 1: 🗞 The New York Times Visit the NYT website and see what Disconnect reports! Sample results
     Like  Bookmark
  • Required Features Step 0: Make sure your hosts file is normal! In Lab 4, we had you adding some lines to your hosts file to mess with Google. This lab needs Google to work, so if you didn't already, make sure you've un-done the changes from Lab 4 to your hosts file. Step 1: Running setoolkit and Setting Up the Credential Harvester It's been preinstalled on your Azure Labs machine, so lets try using setoolkit: Run the setoolkit command using sudo: sudo setoolkit
     Like  Bookmark
  • Lab Instructions Step 0: What is Shodan? What is Shodan? Shodan is a search engine specializing in scanning the internet for connected devices all around the world, and providing a centralized location for publicly available information about these devices. Connected devices range from routers and servers such as: Home security cameras IoT (Internet of Things) such as home devices, intelligent refrigerators and smart door locks Medical devices such as internet-connected heart monitors Complex industrial IoT devices (which can include technology for supply chain and logistics processes, remote asset tracking, drone-based delivery and transportation devices)
     Like  Bookmark
  • Step 0: Set up In this step, we'll download the folder of images we'll use in Cyberchef. Download this folder of images: Lab_6_Images.zip Open Cyberchef in your web browser (on your host machine is fine, no need to use Azure Labs) 🎯 Checkpoint 0: Cyberchef should be open and ready. Step 1: Investigate The Data In An Image In this step, you will open the image called "simpleImage" and investigate it's data in Cyberchef.
     Like  Bookmark
  • Part 1: Observing Virus Detection Step 0: Antivirus check! Make sure that you have some form of antivirus installed on your machine. (If you don't have one, you can install any free antivirus (except Malwarebytes, it doesn't work for this lab) -- Just make sure you're downloading from an official website and not a third-party link.) Windows: ESET Mac: BitDefender Virus Scanner For optimization reasons, popular antivirus tool Malwarebytes has chosen to opt-out of detecting EICAR's testfiles. Malwarebytes is still an excellent antivirus, but if it's what you use, you'll want to download an alternative option for this lab. Step 1: Observe (harmless) virus files Okay, let's get some (fake) viruses! Fortunately, the European Institute for Computer Antivirus Research (EICAR) has us covered with their Anti Malware Testfile website.
     Like  Bookmark
  • Lab-5: DNS tricks tep 0: Check the IP Addresses for Two Different Websites Open up an RDP connection to Ubuntu. In your Ubuntu machine, open a terminal prompt. You can do so by navigating to Applications -> Terminal Emulator.Terminal Prompt in Applications dropdown We will first be using the ping command, which we will use to send out a message (in the form of a packet of information) to Google's servers. If the server is available, it will send a reply back to us. If it's not, we'll see that show as well as a response in the terminal output. Type ping www.google.com in the terminal. Once you hit enter, you'll see the pings start. Let it continue until you've captured about four (4) pings, and then type Control + C in order to stop the command.
     Like  Bookmark
  • Lab-3: Cracking password with John Once you connect to your VM using RDP or SSH, and run the ssudo apt-get purge john -y && sudo snap install john-the-ripper && sudo reboot command in you VM. Your VM will be closed but you cna re-establish you session via ssh and RDp to access the VM. Next, go ahead and unzip the folder (you can use the unzip command) and take a look at the files (using ls). You should have: crackA.txt crackB.txt crackC.txt crackChallenge.txt
     Like  Bookmark
  • How to solve Lab for Unit 2 Part-1 Given Below are the screenshots of how your terminal would after run the commands given in the lab. Part-2 For part-2 this is how moved all the animals into the correct place. First, be sure that you installed the tree command using "sudo apt install tree" so that you can access your files with it. For moving the animals into current pens, I used the rm commands to delete the files in the incorrect pens and used the touch command to create the correct files in the terminal. 2.Then, I renamed some of the files in the folders to give them the correct animal name using the mv command.
     Like  Bookmark
  • Codepath CYB 101 Week 1 Lab Guide Exercise 1: Let's decode! See the message - "Terng wbo qrpbqvat lbhe svefg pvcure!" right? It seems that the letters might have been shifted. If you go to cyber chef and try ROT 13, a shift cipher you see the flag pops up! Flag - Great job decoding your first cipher! Exercise 2: Let's Build a Fence! Wait ... I Need a !#CTOAHDPE!# Key! Well the message is - "Acx'vt dhppu dqpzbui! Yhie im br!". It says that this is a polyalphabetic cipher but needs a key.
     Like  Bookmark