Skip to content

Virtual labs for
Information Security

Ethical Hacking

This set of labs maps to the domains of the Certified Ethical Hacker (CEH). It employs an ethical hacking methodology to introduce the learner to various techniques and tools to include, but not limited to: reconnaissance, scanning, enumeration, exploitation, and post-exploitation.

Over 250 labs for Information Security.

Breakdown of lab content

Lab NameTopics CoveredTools Used
Attacking the Firewall and Stealing Data Over an Encrypted ChannelScanning, hacker types, gaining access, vulnerabilitiesKali, nmap/zenmap,
XAMPP, metasploit,
meterpreter
Attacking Webservers from the WANScanning, hacker types, gaining access, vulnerabilitiesXAMPP, Bruter,
nmap/zenmap, kali,
metasploit
Breaking WEP and WPA and Decrypting the TrafficFTP, TELNET, WEP, WPA, SSID, DNSWireshark, iwconfig, airmonng, airdecap-ng
Capturing and Analyzing Network Traffic Using a SnifferConfiguring interfaces, generating traffic, FTP,TELNET, SMTP, POP3ifconfig, FTP, telnet, smtp,
pop3, wireshark
Crafting and Deploying Malware Using a Remote Access Trojan (RAT)Brute-force attack, malware, viruses, ransomware, trojan horse, rootkits,
backdoors
netstat, RDP, Bruter,
DarkComet, nmap
Enumerating Hosts Using Wireshark, Windows, and Linux CommandsEnumeration/scanningwireshark, ifconfig, net,
nbtstat,
armitage/metasploit
Exploiting a Vulnerable Web ApplicationXAMPP vulnerability, windows smb
vulnerability
nmap/zenmap, metasploit,
kali, armitage
Performing a Denial of Service Attack from the WANDenial-of-serivice attacks, TCP flood,
UDP flood, HTTP Flood
ifconfig, tcpdump, LOIC,
capinfos
Performing Reconnaissance from the WANReconnaissance, scanning, gaining
access, maintaining access, clearing
tracks
kali, nmap, metasploit,
telnet, RDP
Remote and Local ExploitationPorts, vulnerability analysis,
exploitation/attacks, privilege
escalation
nmap/zenmap, openvas,
kali, greenbone, metasploit,
postgres, meterpreter
Scanning the Network on the LANScanning, hacker types, gaining
access, vulnerabilities
nmap, kali, armitage,
metasploit
Social Engineering Using SETSocial engineering, phishing, spear,
whaling, clone, voice, smishing,
pharming
social engineering toolkit,
kali, metasploit
Using Browser Exploitation to Take Over a Host’s ComputerScanning, hacker types, gaining
access, vulnerabilities, spear phishing
kali, metasploit, xampp,
opera mail, meterpreter,
john the ripper, iceweasel
Performing SQL Injection to Manipulate Tables in a DatabaseSQL injection, scanning, backdoornmap/zenmap, kali,
metasploit, meterpreter,
mysql
Attacking the Firewall and Stealing Data over an Encrypted ChannelScanning, gaining access,
vulnerabilities (xampp, smb)
kali, metasploit,
nmap/zenmap,
meterpreter
Using Public Key Encryption to Secure MessagesPKI, Public-Key Encryption, CIA,
Certificates, Digital Signatures
Opera, Kleopatra, GnuPG,
OpenPGP, PGP

Request A Free Educator account