FIVE   |   ELEVEN   |   85%   |   40

          SCENARIOS                    LABS                        HANDS-ON           DURATION

The groups that get stronger are not only the hackers who try to hurt you but also the defense groups in the organizations, the more known the attacks, the more definite their defense. This training offers participants advanced levels of attack to evade the many defense mechanisms available in the market today with the help of independent tools and Python programming capabilities.

LAB 01

Python Basics

LAB 02

Writing Code

LAB 03

Networking with Python

LAB 04

Password Cracking

LAB 05


LAB 06

Scanning with Python

LAB 07

Automation with Python

LAB 08

Web Security with Python

LAB 09

Build Payloads

LAB 10

Local Attacks

LAB 11

Useful Libraries

Scenario: OP001

According to the latest revelation from the "whistleblower" Edward Snowden, British spy agency GCHQ hackers are using NSA search engines similar to Shodan in an attempt to exploit them. Your team selected to mitigate the case; most of the engines running on python. Use your automated tools to solve the case.


Scenario: OP002

Recently, the Internet witnessed a record-breaking, most massive DDoS attack of over 1 Tbps against France-based hosting provider OVH. Following the recent attack, a special team was hired to track the attack.


Scenario: OP003

Researchers from security firm 4iQ have now discovered a new collective database on the dark web that contains a 1.4 billion usernames and passwords. One of the victims related to the attack was an insurance company which suffered the exposure for more than 1000 customers passwords.


Scenario: OP004

A massive Distributed Denial of Service (DDoS) attack against Dyn, a primary domain name system (DNS) provider, broke large portions of the internet. Security researchers are suspecting a botnet activity transmitting the data through some endpoint devices over the internet. 


Scenario: OP005

Reason Cybersecurity recently released a threat analysis report detailing a new attack that takes advantage of internet users. The malware aims explicitly to targets who are looking for cartographic presentations of the spread of COVID-19 on the internet and tricks them into downloading and running a malicious application.

  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber