Chapter 1: Introduction to Information Security
Chapter 2: Passwords & People
Darknet Diaries #33: RockYou
Google Doc | PDF | Word
John the Ripper
Google Doc | PDF | Word
Retrieving Passwords from the Browser
Google Doc | PDF | Word
Peeking at a DACL
Google Doc | PDF | Word
Hash Fun
Google Doc | PDF | Word
HaveIBeenPwned
Google Doc | PDF | Word
Chapter 3: Malware and Threats
Phishing Quiz
Google Doc | PDF | Word
Setting up a chroot Jail
Google Doc | PDF | Word
Exploring VIRUSTOTAL
Google Doc | PDF | Word
Checksumming
Google Doc | PDF | Word
Chapter 4: Information & Cryptography
Create a Fake Tweet
Google Doc | PDF | Word
Steganography
Google Doc | PDF | Word
Linux File Permissions
Google Doc | PDF | Word
The One Time Pad
Google Doc | PDF | Word
Using GnuPG
Google Doc | PDF | Word
Certificates, CRLs, and OCSPs
Google Doc | PDF | Word
Chapter 5: Staying Safe Online
Ghostery Hunting
Google Doc | PDF | Word
Fiddling with DNS
Google Doc | PDF | Word
Using nslookup and whois
Google Doc | PDF | Word
Google Security Checkup
Google Doc | PDF | Word
Darknet Diaries #52: Magecart
Google Doc | PDF | Word
Digging with Dig
Google Doc | PDF | Word
NicOrNot & Fawkes
Google Doc | PDF | Word
Chapter 6: Staying Safe at Home
Configuring a Router
Google Doc | PDF | Word
Home Router Hardening
Google Doc | PDF | Word
Using Wireshark
Google Doc | PDF | Word
Chapter 7: Staying Safe at Work
Canary Tracker
Google Doc | PDF | Word
Configuring a RAID
Google Doc | PDF | Word
Google Dorking
Google Doc | PDF | Word
Installing a Honeypot
Google Doc | PDF | Word
Using dd
Google Doc | PDF | Word
Using Shodan
Google Doc | PDF | Word
Exploring Ransomware
Google Doc | PDF | Word
Darknet Diaries #36: Jeremy from Marketing
Google Doc | PDF | Word
Darknet Diaries #40: No Parking
Google Doc | PDF | Word
Darknet Diaries #54: NotPetya
Google Doc | PDF | Word
Chapter 8: Social Engineering
Using Sherlock
Google Doc | PDF | Word
Using the Social Engineering Toolkit I
Google Doc | PDF | Word
Phishing Website Experience
Google Doc | PDF | Word
Darknet Diaries #56: Jordan
Google Doc | PDF | Word
Darknet Diaries #69: Human Hacker
Google Doc | PDF | Word
Darknet Diaries #80: The Whistleblower
Google Doc | PDF | Word
Using the Social Engineering Toolkit II
Google Doc | PDF | Word
Chapter 9: The Law
Researching the Law
Google Doc | PDF | Word
Distilling one Recent News Article
Google Doc | PDF | Word
Chapter 10: Secure Software Design
Install Java
Google Doc | PDF | Word
Install WebGoat
Google Doc | PDF | Word
Broken Authentication - Password Reset
Google Doc | PDF | Word
Bypass Front-End Restrictions
Google Doc | PDF | Word
Client Side Filtering
Google Doc | PDF | Word
HTML Tampering
Google Doc | PDF | Word
BONUS LABS
Using netcat
Google Doc | PDF | Word
Banner Grabbing
Google Doc | PDF | Word
Using Nmap
Google Doc | PDF | Word
TCP Dump
Google Doc | PDF | Word
Darknet Diaries # 44: Zain
Google Doc | PDF | Word
Â
All content on this page is licensed CC-BY-NC-SA unless otherwise noted.
Darknet Diaries graphic work used with permission. You should check out the podcast. It's unbelievable.