EMATE 2.0 Preview Page

Cookie Caper

https://mirrorlearning.org/emate2/cookies/pub/cookies/Assets/index.html

Phishing

https://mirrorlearning.org/emate2/phishing/pub/phishing/Assets/index.html

Pen Testing

https://mirrorlearning.org/emate2/pen_testing/pub/pen_testing/Assets/index.html

Encryption

https://mirrorlearning.org/emate2/encryption/pub/encryption/Assets/index.html

Ethical Hacking Exam Version 2B

Morse code is melon20

https://mirrorlearning.org/emate2/EH_exam_2B/pub/EH_exam_2B/Assets/index.html

 

Ethical Hacking Exam Version 2A

https://mirrorlearning.org/emate2/EH_exam_2A/pub/EH_exam_2A/Assets/index.html

 

Ethical Hacking Exam Version 1B

https://mirrorlearning.org/emate2/EH_exam_1B/pub/EH_exam_1B/Assets/index.html

Answers:

Window Message:
Use google hacking to get the password for mermecles@gmail.com to open the locked box.

Computer Commands 1 and 2:
cmd
ipconfig /all

Computer 3 search box:
gmail.com

Cipher:
LUMP

Case Folder
#1: Exploit
ANS: “spoofed website” OR “spoofed site” OR “phishing”

#2: Hacker’s name
ANS: “Grant West”

#3: Assigned task
ANS: Write an email to direct users to the site. Email must include the spoofed web address: “www.aple.com”

Ethical Hacking Exam 1A

https://mirrorlearning.org/emate2/EH_exam_1A/pub/EH_exam_1A/Assets/index.html

Answers:

Text Message:
Use google hacking to get the password for suprboy1@hotmail.com to open the locked box.

Computer Commands 1 and 2:
cmd
ipconfig /all

Computer 3 search box:
hotmail.com

Cipher:
GRACE

Case Folder
#1: Exploit
ANS: “spoofed website” OR “spoofed site” OR “phishing”

#2: Hacker’s name
ANS: “Michael Richo”

#3: Assigned task
ANS: Write an email to direct users to the site. Email must include the spoofed web address: “https://ec2-52-204-154-87.compute-1.amazonaws.com/”

 

Stuxnet

https://mirrorlearning.org/emate2/stuxnet/pub/stuxnet/Assets/index.html

Meltdown and Spectre

https://mirrorlearning.org/emate2/meltdown_spectre/pub/meltdown_spectre/Assets/index.html

Social Engineering

https://mirrorlearning.org/emate2/social_engineering/pub/social_engineering/Assets/index.html

Heartbleed

https://mirrorlearning.org/emate2/heartbleed/pub/heartbleed/Assets/index.html

Google Hacking

https://mirrorlearning.org/emate2/googlehacking/pub/googlehacking/Assets/index.html

Cyber Scenario

https://mirrorlearning.org/emate2/cyber_scenario/pub/cyber_scenario/Assets/index.html

Programming Primer

https://mirrorlearning.org/emate2/primer/pub/primer/Assets/index.html

Code Injection Attacks Quiz

https://mirrorlearning.org/emate2/codeinjectionquiz/pub/codeinjectionquiz/Assets/index.html

Code Injection Attacks

https://mirrorlearning.org/emate2/codeinjection/pub/codeinjection/Assets/index.html

Cross Site Scripting

https://mirrorlearning.org/emate2/crosssitescripting/pub/crosssitescripting/Assets/index.html

OS Command Injection Attacks

https://mirrorlearning.org/emate2/oscommandinjection/pub/oscommandinjection/Assets/index.html

Buffer Overflow

https://mirrorlearning.org/emate2/bufferoverflow/pub/bufferoverflow/Assets/index.html

Spoofing Attacks

https://mirrorlearning.org/emate2/spoofing/pub/spoofing1/Assets/index.html

 

SQL Injection

https://mirrorlearning.org/emate2/SQLinjection/pub/SQLinjection/Assets/index.html

 

Pizza Party

https://mirrorlearning.org/emate2/pizza_party_v7_may_12/pub/EMate_pizzaparty_exercise/EMate_pizzaparty_exercise.html

 

OSI Model

https://mirrorlearning.org/emate2/osimodel1/pub/osimodel1/Assets/index.html

 

Three-way Handshake

https://mirrorlearning.org/emate2/threewayhandshake/pub/threeway_handshake1_audio/Assets/index.html

 

Understanding Addresses

https://mirrorlearning.org/emate2/understanding_addresses/pub/EMate_understanding_addresses/Assets/index.html