Information Security Lab Manual

Cover image by Pete Linforth from Pixabay

Chapter 1: Introduction to Information Security

Install Linux in a VM

Google Doc | PDF | Word

Linux Terminal Commands

Google Doc | PDF | Word

Chapter 2: Passwords & People

Darknet Diaries #33: RockYou

Google Doc | PDF | Word

John the Ripper

Google Doc | PDF | Word

Retrieving Passwords from the Browser

Google Doc | PDF | Word

Peeking at a DACL

Google Doc | PDF | Word

Hash Fun

Google Doc | PDF | Word

HaveIBeenPwned

Google Doc | PDF | Word

Security Checkup

Google Doc | PDF | Word

Using SQRL

Google Doc | PDF | Word

Chapter 3: Malware and Threats

Phishing Quiz

Google Doc | PDF | Word

Setting up a chroot Jail

Google Doc | PDF | Word

Exploring VIRUSTOTAL

Google Doc | PDF | Word

Checksumming

Google Doc | PDF | Word

Chapter 4: Information & Cryptography

Create a Fake Tweet

Google Doc | PDF | Word

Steganography

Google Doc | PDF | Word

Linux File Permissions

Google Doc | PDF | Word

The One Time Pad

Google Doc | PDF | Word

Using GnuPG

Google Doc | PDF | Word

Certificates, CRLs, and OCSPs

Google Doc | PDF | Word

Chapter 5: Staying Safe Online

Ghostery Hunting

Google Doc | PDF | Word

Fiddling with DNS

Google Doc | PDF | Word

Using nslookup and whois

Google Doc | PDF | Word

Google Security Checkup

Google Doc | PDF | Word

Darknet Diaries #52: Magecart

Google Doc | PDF | Word

Digging with Dig

Google Doc | PDF | Word

NicOrNot & Fawkes

Google Doc | PDF | Word

Chapter 6: Staying Safe at Home

Configuring a Router

Google Doc | PDF | Word

Home Router Hardening

Google Doc | PDF | Word

Using Wireshark

Google Doc | PDF | Word

The logo for IoT Assistant (a stylized lizard)

IoT Assistant

Google Doc | PDF | Word

Illustration of a central hub with many devices (light bulbs, microphones, etc.) attached to it.

IoT Inspector

Google Doc | PDF | Word

Chapter 7: Staying Safe at Work

Canary Tracker

Google Doc | PDF | Word

Configuring a RAID

Google Doc | PDF | Word

Google Dorking

Google Doc | PDF | Word

Installing a Honeypot

Google Doc | PDF | Word

Using dd

Google Doc | PDF | Word

Using Shodan

Google Doc | PDF | Word

Exploring Ransomware

Google Doc | PDF | Word

Darknet Diaries #36: Jeremy from Marketing

Google Doc | PDF | Word

Darknet Diaries #40: No Parking

Google Doc | PDF | Word

Darknet Diaries #54: NotPetya

Google Doc | PDF | Word

Chapter 8: Social Engineering

Using Sherlock

Google Doc | PDF | Word

Using the Social Engineering Toolkit I

Google Doc | PDF | Word

An illustration of a burglar popping out of a laptop. The burglar has discovered someone's credit cards! The text says, "Phishing Website Experience".

Phishing Website Experience

Google Doc | PDF | Word

Darknet Diaries #56: Jordan

Google Doc | PDF | Word

A stylized rendering of a hardcore exterminator.

Darknet Diaries #69: Human Hacker

Google Doc | PDF | Word

An illustration of a hand controlling a marionette.

Darknet Diaries #80: The Whistleblower

Google Doc | PDF | Word

Using the Social Engineering Toolkit II

Google Doc | PDF | Word

Chapter 9: The Law

Researching the Law

Google Doc | PDF | Word

Distilling one Recent News Article

Google Doc | PDF | Word

Chapter 10: Secure Software Design

An illustration of a coffee mug with steam coming out from it

Install Java

Google Doc | PDF | Word

A red circle with a white illustration of a goat.

Install WebGoat

Google Doc | PDF | Word

A red padlock with the illustration of a goat is unlocked.

Broken Authentication - Password Reset

Google Doc | PDF | Word

An icon of a laptop with a bypass symbol skirting around it.

Bypass Front-End Restrictions

Google Doc | PDF | Word

An illustration of a funnel with a bunch of 1s and 0s going in the top. The word PASSWORD is coming out the bottom.

Client Side Filtering

Google Doc | PDF | Word

A red box with a small goat icon in the bottom and the letters HTML

HTML Tampering

Google Doc | PDF | Word

An illustration of a needle that says SQL.

SQL Injection

Google Doc | PDF | Word

BONUS LABS

Using netcat

Google Doc | PDF | Word

Banner Grabbing

Google Doc | PDF | Word

Using Nmap

Google Doc | PDF | Word

TCP Dump

Google Doc | PDF | Word

Darknet Diaries # 44: Zain

Google Doc | PDF | Word

 

All content on this page is licensed CC-BY-NC-SA unless otherwise noted.
Darknet Diaries graphic work used with permission. You should check out the podcast. It's unbelievable.