 |
Introductory Networking |
An introduction to networking theory and basic networking tools |
Easy
|
Walkthrough
|
 |
Introductory Researching |
A brief introduction to research skills for pentesting. |
Easy
|
Walkthrough
|
 |
Tutorial |
Learn how to use a TryHackMe room to start your upskilling in cyber security. |
Easy
|
Walkthrough
|
 |
MITRE |
Explore the various resources that MITRE has made available to the cyber security community. |
Medium
|
Walkthrough
|
 |
Starting Out In Cyber Sec |
Learn about the different career paths in Cyber Security and how TryHackMe can help! |
Easy
|
Walkthrough
|
 |
Linux Fundamentals Part 1 |
Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal. |
Info
|
Walkthrough
|
 |
Linux Fundamentals Part 2 |
Continue your learning Linux journey with part two. You will be learning how to log in to a Linux machine using SSH, how to advance your commands, file system interaction. |
Info
|
Walkthrough
|
 |
Linux Fundamentals Part 3 |
Power-up your Linux skills and get hands-on with some common utilities that you are likely to use day-to-day! |
Info
|
Walkthrough
|
 |
Windows Fundamentals 1 |
In part 1 of the Windows Fundamentals module, we'll start our journey learning about the Windows desktop, the NTFS file system, UAC, the Control Panel, and more.. |
Info
|
Walkthrough
|
 |
Windows Fundamentals 2 |
In part 2 of the Windows Fundamentals module, discover more about System Configuration, UAC Settings, Resource Monitoring, the Windows Registry and more.. |
Info
|
Walkthrough
|
 |
What is Networking? |
Begin learning the fundamentals of computer networking in this bite-sized and interactive module. |
Info
|
Walkthrough
|
 |
Intro to LAN |
Learn about some of the technologies and designs that power private networks |
Info
|
Walkthrough
|
 |
OSI Model |
Learn about the fundamental networking framework that determines the various stages in which data is handled across a network |
Info
|
Walkthrough
|
 |
Windows Fundamentals 3 |
In part 3 of the Windows Fundamentals module, learn about the built-in Microsoft tools that help keep the device secure, such as Windows Updates, Windows Security, BitLocker, and more... |
Info
|
Walkthrough
|
 |
Phishing Analysis Fundamentals |
Learn all the components that make up an email. |
Easy
|
Walkthrough
|
 |
Phishing Analysis Tools |
Learn the tools used to aid an analyst to investigate suspicious emails. |
Easy
|
Walkthrough
|
 |
Phishing Emails in Action |
Learn the different indicators of phishing attempts by examining actual phishing emails. |
Easy
|
Walkthrough
|
 |
Junior Security Analyst Intro |
Play through a day in the life of a Security Analyst and experience their everyday duties. |
Easy
|
Walkthrough
|
 |
Phishing Prevention |
Learn how to defend against phishing emails. |
Easy
|
Walkthrough
|
 |
Pyramid Of Pain |
Learn what is the Pyramid of Pain and how to utilize this model to determine the level of difficulty it will cause for an adversary to change the indicators associated with them, and their campaign. |
Easy
|
Walkthrough
|
 |
The Greenholt Phish |
Use the knowledge attained to analyze a malicious email. |
Easy
|
Challenge
|
 |
Cyber Kill Chain |
The Cyber Kill Chain framework is designed for identification and prevention of the network intrusions. You will learn what the adversaries need to do in order to achieve their goals. |
Easy
|
Walkthrough
|
 |
Snort |
Learn how to use Snort to detect real-time threats, analyse recorded traffic files and identify anomalies. |
Medium
|
Walkthrough
|
 |
Intro to Malware Analysis |
What to do when you run into a suspected malware. |
Medium
|
Walkthrough
|
 |
NetworkMiner |
Learn how to use NetworkMiner to analyse recorded traffic files and practice network forensics activities. |
Easy
|
Walkthrough
|
 |
Intro to Digital Forensics |
Learn about digital forensics and related processes and experiment with a practical example. |
Easy
|
Walkthrough
|
 |
Operating System Security |
This room introduces users to operating system security and demonstrates SSH authentication on Linux. |
Easy
|
Walkthrough
|
 |
Offensive Security Intro |
Hack your first website (legally in a safe environment) and experience an ethical hacker's job. |
Easy
|
Walkthrough
|
 |
Network Security |
Learn about network security, understand attack methodology, and practice hacking into a target server. |
Easy
|
Walkthrough
|
 |
Web Application Security |
Learn about web applications and explore some of their common security issues. |
Easy
|
Walkthrough
|
 |
Elastic Stack: The Basics |
Understand how SOC analysts use the Elastic Stack (ELK) for log investigations. |
Medium
|
Walkthrough
|
 |
Unified Kill Chain |
The Unified Kill Chain is a framework which establishes the phases of an attack, and a means of identifying and mitigating risk to IT assets. |
Easy
|
Walkthrough
|
 |
ItsyBitsy |
Put your ELK knowledge together and investigate an incident. |
Medium
|
Challenge
|
 |
Defensive Security Intro |
Introducing defensive security and related topics, such as Threat Intelligence, SOC, DFIR, Malware Analysis, and SIEM. |
Easy
|
Walkthrough
|
 |
Benign |
Challenge room to investigate a compromised host. |
Medium
|
Challenge
|
 |
Security Operations |
Learn about Security Operations Center (SOC): its responsibilities, services, and data sources. |
Easy
|
Walkthrough
|
 |
Careers in Cyber |
Learn about the different careers in cyber security. |
Info
|
Walkthrough
|
 |
Wireshark: The Basics |
Learn the basics of Wireshark and how to analyse protocols and PCAPs. |
Easy
|
Walkthrough
|
 |
Intro to Cyber Threat Intel |
Introducing cyber threat intelligence and related topics, such as relevant standards and frameworks. |
Easy
|
Walkthrough
|
 |
Wireshark: Packet Operations |
Learn the fundamentals of packet analysis with Wireshark and how to find the needle in the haystack! |
Easy
|
Walkthrough
|
 |
Introduction to SIEM |
Learn the fundamentals of SIEM and explore its features and functionality. |
Easy
|
Walkthrough
|
 |
Active Directory Basics |
This room will introduce the basic concepts and functionality provided by Active Directory. |
Easy
|
Walkthrough
|
 |
Tempest |
You are tasked to conduct an investigation from a workstation affected by a full attack chain. |
Medium
|
Challenge
|
 |
Wireshark: Traffic Analysis |
Learn the basics of traffic analysis with Wireshark and how to find anomalies on your network! |
Medium
|
Walkthrough
|
 |
Introduction to SOAR |
Learn the concepts and methodology surrounding security orchestration, automation, and response. |
Medium
|
Walkthrough
|
 |
Splunk: The Basics |
Understand how SOC analysts use Splunk for log investigations. |
Easy
|
Walkthrough
|
 |
Boogeyman 1 |
A new threat actor emerges from the wild using the name Boogeyman. Are you afraid of the Boogeyman? |
Medium
|
Walkthrough
|
 |
Snapped Phish-ing Line |
Apply learned skills to probe malicious emails and URLs, exposing a vast phishing campaign. |
Easy
|
Challenge
|
 |
Boogeyman 2 |
The Boogeyman is back. Are you still afraid of the Boogeyman? |
Medium
|
Challenge
|
 |
Boogeyman 3 |
The Boogeyman emerges from the darkness again. |
Medium
|
Challenge
|
 |
Eviction |
Unearth the monster from under your bed. |
Easy
|
Walkthrough
|
 |
Summit |
Can you chase a simulated adversary up the Pyramid of Pain until they finally back down? |
Easy
|
Challenge
|
 |
Windows Command Line |
Learn the essential Windows commands. |
Easy
|
Walkthrough
|
 |
Search Skills |
Learn to efficiently search the Internet and use specialized search engines and technical docs. |
Easy
|
Walkthrough
|
 |
Nmap: The Basics |
Learn how to use Nmap to discover live hosts, find open ports, and detect service versions. |
Easy
|
Walkthrough
|
 |
Networking Concepts |
Learn about the ISO OSI model and the TCP/IP protocol suite. |
Easy
|
Walkthrough
|
 |
Tcpdump: The Basics |
Learn how to use Tcpdump to save, filter, and display packets. |
Easy
|
Walkthrough
|
 |
Networking Essentials |
Explore networking protocols from automatic configuration to routing packets to the destination. |
Easy
|
Walkthrough
|
 |
Networking Core Protocols |
Learn about the core TCP/IP protocols. |
Easy
|
Walkthrough
|
 |
Networking Secure Protocols |
Learn how TLS, SSH, and VPN can secure your network traffic. |
Easy
|
Walkthrough
|
 |
IDS Fundamentals |
Learn the fundamentals of IDS, along with the experience of working with Snort. |
Easy
|
Walkthrough
|
 |
Public Key Cryptography Basics |
Discover how public key ciphers such as RSA work and explore their role in applications such as SSH. |
Easy
|
Walkthrough
|
 |
Cryptography Basics |
Learn the basics of cryptography and symmetric encryption. |
Easy
|
Walkthrough
|
 |
Hashing Basics |
Learn about hashing functions and their uses in password verification and file integrity checking. |
Easy
|
Walkthrough
|
 |
Windows PowerShell |
Discover the "Power" in PowerShell and learn the basics. |
Easy
|
Walkthrough
|
 |
Linux Shells |
Learn about scripting and the different types of Linux shells. |
Easy
|
Walkthrough
|
 |
SOC L1 Alert Triage |
Learn more about SOC alerts and build a systematic approach to efficiently triaging them. |
Easy
|
Walkthrough
|
 |
SOC L1 Alert Reporting |
Learn how to properly report, escalate, and communicate about high-risk SOC alerts. |
Easy
|
Walkthrough
|
 |
SOC Workbooks and Lookups |
Discover useful corporate resources to help you structure and simplify L1 alert triage. |
Easy
|
Walkthrough
|
 |
SOC Metrics and Objectives |
Explore key metrics driving SOC effectiveness and discover ways to improve them. |
Easy
|
Walkthrough
|
 |
Windows Logging for SOC |
Start your Windows monitoring journey by learning how to use system logs to detect threats. |
Easy
|
Walkthrough
|
 |
Windows Threat Detection 1 |
Explore common Initial Access methods on Windows and learn how to detect them. |
Medium
|
Walkthrough
|
 |
Windows Threat Detection 2 |
Discover how to detect and analyze the first steps of threat actors after breaching Windows. |
Medium
|
Walkthrough
|
 |
Detecting Web Shells |
Explore web shell detection by analyzing logs, file systems, and network traffic. |
Easy
|
Walkthrough
|
 |
File and Hash Threat Intel |
This room seeks to teach on enriching file and hash artefacts using threat intelligence. |
Easy
|
Walkthrough
|
 |
Windows Threat Detection 3 |
Learn how threat actors manage to maintain access to the breached Windows hosts. |
Medium
|
Walkthrough
|
 |
Humans as Attack Vectors |
Understand why and how people are targeted in cyber attacks and how the SOC helps defend them. |
Easy
|
Walkthrough
|
 |
Systems as Attack Vectors |
Learn how attackers exploit vulnerable and misconfigured systems, and how you can protect them. |
Easy
|
Walkthrough
|
 |
Log Analysis with SIEM |
Learn how SIEM solutions can be used to detect and analyse malicious behaviour. |
Medium
|
Walkthrough
|
 |
SOC Role in Blue Team |
Discover security roles and learn how to advance your SOC career, starting from the L1 analyst. |
Easy
|
Walkthrough
|
 |
Web Security Essentials |
Learn how the web works, common website security risks, and protections for a safer internet. |
Easy
|
Walkthrough
|
 |
Network Discovery Detection |
Understand how attackers discover assets in a network, and how to detect that activity. |
Medium
|
Walkthrough
|
 |
Linux Logging for SOC |
Explore key Linux log sources and learn how to use them in your SOC triage. |
Easy
|
Walkthrough
|
 |
IP and Domain Threat Intel |
A look into enriching IP and domain insights with open source threat intelligence. |
Medium
|
Walkthrough
|
 |
Invite Only |
Extract insight from a set of flagged artefacts, and distil the information into usable threat intelligence. |
Easy
|
Challenge
|
 |
Detecting Web Attacks |
Explore web attacks and detection methods through log and network traffic analysis. |
Easy
|
Walkthrough
|
 |
Man-in-the-Middle Detection |
Learn what MITM attack is, and how to identify the footprints of this attack in the network traffic. |
Easy
|
Walkthrough
|
 |
Linux Threat Detection 1 |
Explore how attackers break into Linux systems and how you can detect this in logs. |
Medium
|
Walkthrough
|
 |
Malware Classification |
Learn how to identify, classify, and understand common types of malware. |
Easy
|
Walkthrough
|
 |
Alert Triage With Splunk |
Use Splunk to triage alerts and investigate malicious activity efficiently. |
Medium
|
Walkthrough
|
 |
Introduction to EDR |
Learn the fundamentals of EDR and explore its features and working. |
Easy
|
Walkthrough
|
 |
Network Security Essentials |
Learn about key aspects of network security essentials and how to monitor and protect against adversaries. |
Easy
|
Walkthrough
|
 |
Detecting Web DDoS |
Explore denial-of-service attacks, detection techniques, and strategies for protection. |
Easy
|
Walkthrough
|
 |
Linux Threat Detection 2 |
Explore the first actions of attackers after breaching a Linux server and learn how to detect them. |
Medium
|
Walkthrough
|
 |
Shadow Trace |
Analyse a suspicious file, uncover hidden clues, and trace the source of the infection. |
Easy
|
Challenge
|
 |
Linux Threat Detection 3 |
Cover the last stages of attacks on Linux and learn how they look in system logs. |
Medium
|
Walkthrough
|
 |
Alert Triage With Elastic |
Investigate alerts with Elastic by analyzing logs and spotting threats. |
Medium
|
Walkthrough
|
 |
Network Traffic Basics |
Learn what network analysis is, why it is essential, how to collect network traffic and which tools are available |
Easy
|
Walkthrough
|
 |
Data Exfiltration Detection |
Learn how to detect data exfiltration attempts in various network channels. |
Medium
|
Walkthrough
|
 |
Living Off the Land Attacks |
Learn to detect and analyse Living Off the Land attacks using trusted Windows tools. |
Easy
|
Walkthrough
|
 |
Blue |
Deploy & hack into a Windows machine, leveraging common misconfigurations issues. |
Easy
|
Walkthrough
|
 |
John the Ripper: The Basics |
Learn how to use John the Ripper, a powerful and adaptable hash-cracking tool. |
Easy
|
Walkthrough
|
 |
How Websites Work |
To exploit a website, you first need to know how they are created. |
Easy
|
Walkthrough
|
 |
Putting it all together |
Learn how all the individual components of the web work together to bring you access to your favourite web sites. |
Easy
|
Walkthrough
|
 |
DNS in Detail |
Learn how DNS works and how it helps you access internet services. |
Easy
|
Walkthrough
|
 |
HTTP in Detail |
Learn about how you request content from a web server using the HTTP protocol |
Easy
|
Walkthrough
|
 |
Packets & Frames |
Understand how data is divided into smaller pieces and transmitted across a network to another device. |
Info
|
Walkthrough
|
 |
Extending Your Network |
Learn about some of the technologies used to extend networks out onto the Internet and the motivations for this. |
Info
|
Walkthrough
|
 |
Metasploit: Exploitation |
Using Metasploit for scanning, vulnerability assessment and exploitation. |
Easy
|
Walkthrough
|
 |
Metasploit: Introduction |
An introduction to the main components of the Metasploit Framework. |
Easy
|
Walkthrough
|
 |
Metasploit: Meterpreter |
Take a deep dive into Meterpreter, and see how in-memory payloads can be used for post-exploitation. |
Easy
|
Walkthrough
|
 |
Windows Internals |
Learn and understand the fundamentals of how Windows operates at its core. |
Medium
|
Walkthrough
|
 |
Tardigrade |
Can you find all the basic persistence mechanisms in this Linux endpoint? |
Medium
|
Walkthrough
|
 |
Dissecting PE Headers |
Learn about Portable Executable files and how their headers work. |
Medium
|
Walkthrough
|
 |
Sigma |
Provide understanding to Sigma, a Generic Signature Format for SIEM Systems. |
Medium
|
Walkthrough
|
 |
Security Principles |
Learn about the security triad and common security models and principles. |
Easy
|
Walkthrough
|
 |
x86 Architecture Overview |
A crash course in x86 architecture to enable us in malware reverse engineering. |
Easy
|
Walkthrough
|
 |
x86 Assembly Crash Course |
A crash course in x86 assembly to enable us in malware reverse engineering. |
Medium
|
Walkthrough
|
 |
Intro to Detection Engineering |
Introduce the concept of detection engineering and the frameworks used towards crafting effective threat detection strategies. |
Easy
|
Walkthrough
|
 |
Aurora EDR |
Familiarise with the use of a Sigma-based EDR tool, Aurora. |
Medium
|
Walkthrough
|
 |
Tactical Detection |
Establish a baseline knowledge of tactical detection, leveraging efficient techniques to bolster your security posture. |
Medium
|
Walkthrough
|
 |
SigHunt |
You are tasked to create detection rules based on a new threat intel. |
Medium
|
Challenge
|
 |
Basic Static Analysis |
Learn basic malware analysis techniques without running the malware. |
Medium
|
Walkthrough
|
 |
MalBuster |
You are tasked to analyse unknown malware samples detected by your SOC team. |
Medium
|
Walkthrough
|
 |
Splunk: Exploring SPL |
Learn and explore the basics of the Search Processing Language. |
Medium
|
Walkthrough
|
 |
Threat Intelligence for SOC |
Learn how to utilise Threat Intelligence to improve the Security Operations pipeline. |
Medium
|
Walkthrough
|
 |
Basic Dynamic Analysis |
Learn how to analyze malware Dynamically by running them in a Virtual Machine. |
Medium
|
Walkthrough
|
 |
Atomic Red Team |
Leveraging the Atomic Red Team Framework to strengthen the Security Operations' detection capabilities. |
Medium
|
Walkthrough
|
 |
Intro to Threat Emulation |
A look into threat emulation practices as a means of cyber security assessment. |
Medium
|
Walkthrough
|
 |
Splunk: Setting up a SOC Lab |
Explore Splunk beyond basics. |
Medium
|
Walkthrough
|
 |
Anti-Reverse Engineering |
Learn the techniques used by malware authors to bypass detection. |
Medium
|
Walkthrough
|
 |
Dynamic Analysis: Debugging |
Learn more advanced techniques of dynamic malware analysis. |
Medium
|
Walkthrough
|
 |
CALDERA |
Leveraging CALDERA to emulate various adversarial activities for detection capability testing. |
Hard
|
Walkthrough
|
 |
Advanced Static Analysis |
Learn how to identify code constructs and examine the assembly code of malware. |
Medium
|
Walkthrough
|
 |
MalDoc: Static Analysis |
Perform detailed Static Analysis on malicious documents. |
Medium
|
Walkthrough
|
 |
Threat Modelling |
Building cyber resiliency and emulation capabilities through threat modelling. |
Medium
|
Walkthrough
|
 |
Advanced ELK Queries |
Search large datasets efficiently with advanced queries in Kibana. |
Easy
|
Walkthrough
|
 |
Intro to Logs |
Learn the fundamentals of logging, data sources, collection methods and principles to step into the log analysis world. |
Easy
|
Walkthrough
|
 |
Preparation |
A look into the Preparation phase of the Incident Response. |
Medium
|
Walkthrough
|
 |
Threat Intel & Containment |
Learn what threat intelligence looks like, and some containment strategies used in the IR process. |
Easy
|
Walkthrough
|
 |
Logstash: Data Processing Unit |
Learn how to collect, process and transform data with Logstash. |
Medium
|
Walkthrough
|
 |
Threat Hunting: Foothold |
Hunting suspicious activities indicating initial user or host compromise. |
Medium
|
Walkthrough
|
 |
Threat Hunting: Pivoting |
Hunting suspicious activities indicating threat propagation across the infrastructure. |
Medium
|
Walkthrough
|
 |
Custom Alert Rules in Wazuh |
Learn how to create rules in Wazuh for your environment. |
Easy
|
Walkthrough
|
 |
Splunk: Dashboards and Reports |
Creating Dashboards and Reports in Splunk. |
Easy
|
Walkthrough
|
 |
Threat Hunting: Introduction |
Behind the scenes of Threat Hunting - mindset, process, and goals. |
Easy
|
Walkthrough
|
 |
Splunk: Data Manipulation |
Learn how to parse and manipulate data in Splunk. |
Medium
|
Walkthrough
|
 |
Slingshot |
Can you retrace an attacker's steps after they enumerate and compromise a web server? |
Easy
|
Walkthrough
|
 |
Burp Suite: The Basics |
An introduction to using Burp Suite for web application pentesting. |
Info
|
Walkthrough
|
 |
Threat Hunting: Endgame |
Learn how to hunt and discover suspicious activities indicating actions on objectives. |
Medium
|
Walkthrough
|
 |
Intro to Log Analysis |
An intro to log analysis, best practices, and essential tools for effective detection and response. |
Easy
|
Walkthrough
|
 |
Identification & Scoping |
A look into the second phase of the Incident Response Framework, Identification & Scoping. |
Medium
|
Walkthrough
|
 |
Atomic Bird Goes Purple #1 |
Time to simulate hunting and detecting activities to sharpen your purple teaming skills. |
Medium
|
Walkthrough
|
 |
Atomic Bird Goes Purple #2 |
Time to simulate hunting and detecting activities to sharpen your purple teaming skills. |
Medium
|
Walkthrough
|
 |
Eradication & Remediation |
A look into the fourth phase of the Incident Response framework: Eradication, Remediation, and Recovery. |
Easy
|
Walkthrough
|
 |
Lessons Learned |
A look into the fifth phase of the Incident Response framework: Lessons Learned. |
Easy
|
Walkthrough
|
 |
Log Operations |
Learn the operation process details. |
Easy
|
Walkthrough
|
 |
Hunt Me I: Payment Collectors |
A Finance Director was recently phished. Can you hunt the logs and determine what damage was done? |
Medium
|
Walkthrough
|
 |
Fixit |
Fix the log parsing issue and analyze the logs in Splunk. |
Medium
|
Walkthrough
|
 |
Hunt Me II: Typo Squatters |
One of your software developers unknowingly installed a malicious software. Can you trace back the root cause? |
Medium
|
Walkthrough
|
 |
Moniker Link (CVE-2024-21413) |
Leak user's credentials using CVE-2024-21413 to bypass Outlook's Protected View. |
Easy
|
Walkthrough
|
 |
Incident Response Fundamentals |
Learn how to perform Incident Response in cyber security. |
Easy
|
Walkthrough
|
 |
Logs Fundamentals |
Learn what logs are and how to analyze them for effective investigation. |
Easy
|
Walkthrough
|
 |
SOC Fundamentals |
Learn about the SOC team and their processes. |
Easy
|
Walkthrough
|
 |
Digital Forensics Fundamentals |
Learn about digital forensics and related processes and experiment with a practical example. |
Easy
|
Walkthrough
|
 |
Firewall Fundamentals |
Learn about firewalls and get hands-on with Windows and Linux built-in firewalls. |
Easy
|
Walkthrough
|
 |
Vulnerability Scanner Overview |
Learn about vulnerability scanners and how they work in a practical scenario. |
Easy
|
Walkthrough
|
 |
CyberChef: The Basics |
This room is an introduction to CyberChef, the Swiss Army knife for cyber security professionals. |
Easy
|
Walkthrough
|
 |
CAPA: The Basics |
Learn to use CAPA to identify malicious capabilities. |
Easy
|
Walkthrough
|
 |
FlareVM: Arsenal of Tools |
Learn the arsenal of investigative tools in FlareVM. |
Easy
|
Walkthrough
|
 |
REMnux: Getting Started |
Learn how you can use the tools inside the REMnux VM. |
Easy
|
Walkthrough
|
 |
Gobuster: The Basics |
This room focuses on an introduction to Gobuster, an offensive security tool used for enumeration. |
Easy
|
Walkthrough
|
 |
Training Impact on Teams |
Discover the impact of training on teams and organisations. |
Info
|
Walkthrough
|
 |
SQLMap: The Basics |
Learn about SQL injection and exploit this vulnerability through the SQLMap tool. |
Easy
|
Walkthrough
|
 |
JavaScript Essentials |
Learn how to use JavaScript to add interactivity to a website and understand associated vulnerabilities. |
Easy
|
Walkthrough
|
 |
Web Application Basics |
Learn the basics of web applications: HTTP, URLs, request methods, response codes, and headers. |
Easy
|
Walkthrough
|
 |
SQL Fundamentals |
Learn how to perform basic SQL queries to retrieve and manage data in a database. |
Easy
|
Walkthrough
|
 |
Shells Overview |
Learn about the different types of shells. |
Easy
|
Walkthrough
|
 |
OWASP Top 10 2025: IAAA Failures |
Learn about A01, A07, and A09 in how they related to failures in the applied IAAA model. |
Easy
|
Walkthrough
|
 |
OWASP Top 10 2025: Application Design Flaws |
Learn about A02, A03, A06, and A10 and how they related to design flaws in the application. |
Easy
|
Walkthrough
|
 |
OWASP Top 10 2025: Insecure Data Handling |
Learn about A04, A05, and A08 as they related to insecure data handling. |
Easy
|
Walkthrough
|