Skip to content
Dave edited this page May 25, 2023 · 35 revisions

Welcome to the SEC-335 home landing page!

Forewarning

This course covers materials related to ethical hacking. The materials are intended for educational and research purposes only and should not be used for malicious purposes or to cause harm to anyone or anything.

Directory

Date Assignment Link
1-16 Activity 1.1 - Ethical Hacking Discussion Activity 1.1
1-29 Activity 2.1 - Host Discovery 2.1a
1-29 Lab 2.1 - Port Scanning 1 (NMAP) 2.1
1-29 Lab 2.2 - Port Scanning 2 2.2
1-30 Activity 3.1 - DNS Enumeration 3.1a
2-5 Assignment 3.1 - PowerShell and DNS 3.1
2-5 Assignment 3.2 - DNS uses TCP and UDP 3.2
2-9 Assignment 4.1 Exploiting Cupcake Issues 4.1
2-11 Assignment 4.2 "Hacking" Laws 4.2
2-13 Assignment 5.1 - Breaking into Kali 5.1
2-13 Lab 5.1 - Password Guessing 5.1
3-7 Lab 6.1 - Cracking Linux Passwords with JtR and Hashcat 6.1
*** Lab 7.1 - Exploting Pippin 7.1
*** Lab 7.1 - Webshells 7.1
*** Lab 8.1 - Weevely 8.1
*** Lab 8.2 - Reverse Shells 8.2
*** Lab 9.1 - SQLi Review 9.1
*** Lab 9.2 - Exploiting Gloin 9.2
*** Nancurunir Report Nan.
*** FINAL REPORT Fin

*** = Put on Github during summer overhaul so I forgot the due dates.

Notes

Date Assignment Link
1-16 Notes Week 1 Notes 1
1-23 Notes Week 2 Notes 2
1-30 Notes Week 3 Notes 3
2-6 Notes Week 4 Notes 4
2-13 Notes Week 5 Notes 5