html web templates

Shane Diesel ★

Vin Diesel's life and career are a testament to his perseverance and dedication to his craft. From his early days in theater to his current status as a Hollywood A-lister, Diesel has proven himself to be a versatile and talented actor. His contributions to the film industry continue to entertain and inspire audiences around the world.

Throughout his career, Vin Diesel has received numerous awards and nominations. He has been nominated for a MTV Movie Award, a Teen Choice Award, and a People's Choice Award. In 2013, he received a star on the Hollywood Walk of Fame. shane diesel

Vin Diesel's rise to fame began with the 2000 film Pitch Black, which spawned a successful franchise. The film's success led to more prominent roles in films such as The Fast and the Furious (2001) and xXx (2002). The Fast and Furious franchise would go on to become a massive success, grossing over $5 billion worldwide. Vin Diesel's life and career are a testament

The Life and Career of Shane Diesel's Brother: A Look into the Life of Vin Diesel Throughout his career, Vin Diesel has received numerous

Lab Setup

You can build your own lab as elaborate as you would like. However, for the purpose of this class, the following virtual machines (VMs) will be used.

WebSploit

Kali + Additional Tools + Vulnerable Applications in Docker containers...

Raven

A vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

VTCSEC

Another vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

Shane Diesel ★

This video explains how to setup the virtual machines in your system using Virtual Box.

Topology

The diagram below shows the lab architecture with WebSploit Full version, Raven, and VTCSEC. The VMs were created in Virtual Box. It is highly recommended that you use Virtual Box. However, if you are familiar with different virtualization platforms, you should be able to run the VMs in VMWare Workstation Pro (Windows), VMWare Fusion (Mac), or vSphere Hypervisor (free ESXi server). 

You should create a VM-only network to deploy your vulnerable VMs and perform several of the attacks using WebSploit (Kali Linux), as shown in the video above. You can configure a separate network interface in your WebSploit VM to connect to the rest of your network and subsequently the Internet. Preferably, that interface should be in NAT mode.

Mobirise

LAB GUIDES

Lab guides will be distributed during class...

Omar's Cybersecurity GitHub Repository 

Over 8,000 cybersecurity references related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. 

Stay in Touch with Omar!

© Copyright 2020, Omar Santos - All Rights Reserved