Written by Anthony Carballo
on December 05, 2019

You might have heard about our partnership with Cybrary.

Cybrary is an E-learning community where people can learn pretty much everything about cybersecurity.

We are also contributing to this community by making new courses and blogs; both companies have one common passion: cybersecurity.

We are working together to empower people and businesses to improve their cybersecurity skills and posture.


Cybrary offers training for free

At Cybrary, you can get high-quality training 100% online, where you are, and at the time you need. Their courses go from beginners up to experienced professionals within the field. Previously, IT training was limited to those who had the money to afford expensive training.


They also offer two more methods:

  1. Insider-Pro, which gives you access to more resources such as premium career development, hands-on virtual labs. Where you not only can put into practice what you have learned but also learn on the go, since they have very cool guided Labs. These structured programs will allow you to work directly with a mentor and community of peers to define your career goals and invest in your development through a defined Career Path.
  2. The business method, as you might guess, this is business-oriented, allowing your team to grow in this field of cybersecurity. It provides all the content of the Insider-Pro plan, but also you can gain a clear view of your own employees’ talents. You can assign them a set of courses to complete, and at the same time, you can have the visibility of who’s working harder to complete those courses.

So, you might be interested in what those hands-on labs are and what they look like. Are they any good? Well, the short answer is yes! They are outstanding, and here is why:


Their guided Labs, where you can learn on the go.


Introduction to OWASP Top Ten A3 - Sensitive Data Exposure

In this Lab, you will learn how to test your website (or any other with previous authorization) using a tool made by OWASP.

First, you need to log in; your credentials are in the tab ‘Resources.’

Picture 1


After logging in, you will see the Kali Linux desktop, at the side are your scenario and instructions, some other tips are generally in there too. The objective here is to find data that a regular user should not be able to see. It would give you visibility of things that you might not want to be publicly accessible.


Picture 2


The first thing they ask you to do after you have logged in is to go to the Terminal and type a command to launch Nikto (a vulnerability scanner) on a fictional website. When the scan finishes, you need to scroll up to the top and start searching for interesting results.


Picture 3


An interesting one here is robots.txt, http://mutillidae/mutillidae/robots.txt, you can go to this fictional site within your Lab to see what is in there.

All directories and files found should be viewed to see if there is something of interest. For instance, robots.txt shows you a directory. However, if you look closely, in the results from Nikto, this directory was also found. By only going to that path on the website, you can see sensitive information that no one should be able to see.


Picture 4


Some more findings are in the Nikto results; we see a list of directories that were found. Some contain interesting information, and some do not, but each should be checked. The data directory contains a single file accounts.xml, which is just an XML version of the document we already found in the passwords directory.

Another tool used in this Lab is Dirbuster, Nikto scans for common issues, but it won't be able to find everything. Dirbuster also won't be able to find everything, but it will give a much broader view of what is contained on the website. It takes a while, so be patient.


Picture 5



WASE Assessment.

Also, another type of Lab is the one that has no guide, where you need to put in practice all your knowledge and skills.

For this example, we will take the Lab named WASE Assessment.

WASE stands for Web Application Security Essentials. Topics that you should know to complete this Lab are SQLi, path traversal, unrestricted file upload, IDOR, and XSS.

Is this case, the Lab is running Xfce, a lightweight desktop environment for UNIX-like operating systems. It aims to be fast and low on system resources while still being visually appealing and user-friendly. Indeed, a Kali Linux would be much help, but at the same time, it does the job.

In this fictional scenario, the server has been taken over by cybercriminals, and the responsible system administrator has been locked out. You have to use whatever means necessary to acquire critical data needed to keep the server running.


Picture 6


You will have instructions and some tiny hints. However, all you need to complete; it is knowledge and patience.

The first step is to break in into the server that was hijacked by the criminal. You need to do this by doing SQLi (SQL injection), we did it by the method of trial and error as you can see by the following .gif.


trial and error


After gaining access to the compromised server, you will get the key for the next step, submit it, and move to the following challenge.


Picture 8


The next step requires some patience and knowledge of knowing what and where to search for, they ask you for the alias of the leader aka the hacker – which should be stored in the passwd directory path. However, as you might know, this can take several subfolders (../../../). You can do it with the help of the previously used tool, Dirbuster. However, as stated in the other Lab, this takes a while.


Picture 9


The following steps are really interesting to accomplish. However, if we provide you the full guide, it loses the purpose of being an unguided Lab – so, we wish you the best luck.

Let Us Know What You Thought about this Post.

Put your Comment Below.

You may also like: