FIVE   |   EIGHT   |   85%   |   40

          SCENARIOS                    LABS                       HANDS-ON           DURATION

The groups that get stronger are not only the hackers who try to hurt you but also the defense groups in the organizations, the more known the attacks, the more definite their defense. This training offers participants advanced levels of attack to evade the many defense mechanisms available in the market today with the help of independent tools and Python programming capabilities.

LAB 01

Basic Python Scripting

LAB 02

Building Remote Connection

LAB 03

Scapy Attacks

LAB 04

Advanced Scanning

LAB 05

Password Cracking

LAB 06

Web Application with Python

LAB 07

Automatic Attacks

LAB 08

Fuzzers with Python

Scenario: OP001

According to the latest revelation from the "whistleblower" Edward Snowden, British spy agency GCHQ hackers are using NSA search engines similar to Shodan in an attempt to exploit them. Your team selected to mitigate the case; most of the engines running on python. Use your automated tools to solve the case.


Scenario: OP002

Recently, the Internet witnessed a record-breaking, most massive DDoS attack of over 1 Tbps against France-based hosting provider OVH. Following the recent attack, a special team was hired to track the attack.


Scenario: OP003

Researchers from security firm 4iQ have now discovered a new collective database on the dark web that contains a 1.4 billion usernames and passwords. One of the victims related to the attack was an insurance company which suffered the exposure for more than 1000 customers passwords.


Scenario: OP004

A massive Distributed Denial of Service (DDoS) attack against Dyn, a primary domain name system (DNS) provider, broke large portions of the internet. Security researchers are suspecting a botnet activity transmitting the data through some endpoint devices over the internet. 


Scenario: OP005

Reason Cybersecurity recently released a threat analysis report detailing a new attack that takes advantage of internet users. The malware aims explicitly to targets who are looking for cartographic presentations of the spread of COVID-19 on the internet and tricks them into downloading and running a malicious application.

  • White LinkedIn Icon
  • White Facebook Icon

Ze'ev Jabotinsky St 7,
Ramat Gan, IL.

© 2020 by ThinkCyber