- Updated the action prompt to emphasize the purpose of working through the Active Directory and LDAP setup guides as a starting point for the assignment.
- Enhanced clarity while maintaining consistency with previous updates.
- Modified the links for the Active Directory and LDAP guides to use hyphens instead of underscores for improved consistency and readability.
- Ensured that action prompts remain clear and actionable.
- Updated action prompts for the Active Directory and LDAP guides to improve clarity and consistency.
- Changed formatting from "==action: Complete the guide:==" to a more streamlined "> Action: Complete the guide." for better readability.
- Changed "organisation" to "organization" for consistency with American English.
- Standardized the spelling of "customised" to "customized" throughout the document.
- Enhanced clarity in action links for the Active Directory and LDAP setup guides.
- Improved overall readability by ensuring consistent terminology and formatting.
- Introduced a new lab document covering centralised authentication and directory services, focusing on Active Directory and LDAP.
- Updated the Active Directory setup guide title and streamlined the introduction for clarity.
- Removed backticks from server names for consistency.
- Changed quotes around organizational unit names from backticks to standard quotes for clarity.
- Updated command syntax in the nslcd configuration section to reflect correct usage of 'compat' instead of 'files'.
- Enhanced overall readability by standardizing formatting across steps.
- Introduced a comprehensive guide for setting up LDAP authentication between the auth_server and staff_desktop.
- Included detailed steps for finding the auth_server IP, accessing phpLDAPadmin, creating organizational units, groups, and users, and configuring the LDAP client on staff_desktop.
- Corrected command syntax for sending messages and checking port connectivity in the scanning lab, ensuring accurate execution of examples.
- Updated formatting for consistency and clarity in code snippets throughout the document.
- Improved handling of ==edit:== syntax to avoid interference from block-level elements, ensuring accurate highlighting in various contexts.
- Added support for HTML-encoded quotes and refined regex patterns to address common issues caused by syntax highlighting in code blocks.
- Introduced a troubleshooting guide for future issues related to edit highlights, detailing common patterns and debugging steps.
- Updated CSS to include Ruby language support for better code block labeling.
- Added heading formatting rules to the highlighting guide, specifying the removal of bold formatting and preservation of anchor links.
- Updated authors for the C and Assembly Language lab to include Tom Shaw and Z. Cliffe Schreuders.
- Introduced PHP language support in the hacktivity theme CSS for improved code block labeling.
- Introduced a new lab focused on human factors and social engineering through phishing simulations, emphasizing the psychological tactics used in phishing attacks.
- Included detailed instructions for conducting phishing exercises, crafting malicious emails, and creating harmful attachments to understand user vulnerabilities.
- Enhanced documentation with an overview, tags, categories, and a lab sheet URL for improved accessibility and user engagement.
- Added multiple images to support the lab content, enhancing visual learning and engagement.
- Introduced a new lab focused on the reverse engineering and analysis of the Coconut malware sample, providing hands-on experience with advanced malware analysis techniques.
- Included sections on packer identification, network analysis, backdoor detection, and YARA rule creation, along with interactive challenges facilitated by Hackerbot.
- Enhanced documentation with detailed descriptions, tags, and structured content to improve accessibility and user engagement.
- Introduced two new labs: one focusing on advanced malware behavior analysis using dynamic techniques, and another on anti-reverse-engineering methods including anti-debugging and code obfuscation.
- Each lab includes practical CTF challenges to enhance hands-on learning and understanding of malware analysis.
- Updated documentation with detailed descriptions, tags, and links to lab sheets for improved accessibility and organization.
- Added an illustrative image to support the anti-reverse-engineering lab content, enhancing visual engagement.
- Introduced a new lab on dynamic analysis and debugging using GDB, covering breakpoints, memory examination, and practical CTF challenges for runtime behavior analysis.
- Updated the highlighting guide with examples for image captions and C code formatting to improve clarity and consistency.
- Added multiple images to support the new lab content, enhancing visual learning and engagement.
- Introduced a new lab on Ghidra software reverse engineering, covering ELF file structure, disassembly, decompilation, and practical CTF challenges for malware analysis.
- Updated the authors in the existing assembly lab documentation to include Tom Shaw and Z. Cliffe Schreuders, enhancing collaboration and credit.
- Added multiple images to support the new lab content, improving visual learning and engagement.
- Introduced a section on inline code formatting in the highlighting guide, emphasizing the use of backticks and removal of markdown artifacts.
- Added a new lab on recognizing C code constructs in assembly, covering branching, conditionals, loops, switch statements, arrays, strings, and structs.
- Included practical exercises and examples to enhance understanding of assembly language and its relation to C programming.
- Added multiple images to support the new lab content, improving visual learning and engagement.
- Introduced a new lab on C programming and assembly language, covering key concepts such as structs, memory management, and bitwise operators.
- Included practical exercises for reverse engineering and low-level programming skills, with detailed code examples and actions.
- Added multiple images to enhance understanding of memory layout and assembly instructions, improving visual learning.
- Updated formatting guidelines for C and assembly code to ensure proper syntax highlighting and readability.
- Changed command examples in the Linux cheat sheet to use code formatting for better readability.
- Updated the lab metadata section to hide when embedded, improving the layout.
- Renamed "Table of Contents" to "Contents" for consistency in the lab layout.
- Added new sections on image caption formatting and C code formatting to improve clarity and consistency in lab documentation.
- Introduced specific formatting examples for image captions and C code blocks, emphasizing proper syntax and readability.
- Updated existing image captions across multiple labs to follow the new italicized format for better presentation.
- Introduced a comprehensive new lab on dynamic and static analysis of malware, covering fundamental techniques for analyzing binary executables and reverse engineering.
- Included detailed sections on static and dynamic analysis methods, safe analysis environments, and practical exercises with Capture The Flag (CTF) challenges.
- Added multiple images to enhance understanding of key concepts, including ASCII representation, ELF file structure, and hex dumps.
- Refactored the lab listing to group labs by unique categories and sort them alphabetically for better organization.
- Added a new CTF challenge titled "Feeling Blu Challenge - Web Security CTF" with comprehensive instructions and resources for penetration testing and privilege escalation.
- Updated the lab layout to include tags for better categorization and improved user navigation.
- Introduced multiple new images to support the new lab content, enhancing visual learning and engagement.
- Removed conditional webrick gem inclusion from Gemfile, clarifying its necessity for local development with Ruby 3.2+.
- Updated Gemfile.lock to remove unnecessary architecture-specific ffi and nokogiri entries, streamlining dependencies.
- Added webrick installation command in start-server-github-pages.sh for local development compatibility.
- Updated 'coffee-script-source' to version 1.12.2.
- Upgraded 'gemoji' to version 4.1.0 and 'github-pages' to version 232, along with their respective dependencies.
- Increased 'jekyll' version to 3.10.0 and updated related gems including 'jekyll-avatar', 'jekyll-coffeescript', and 'jekyll-commonmark-ghpages'.
- Updated 'nokogiri' and 'rouge' versions for improved compatibility and security.
- Adjusted 'public_suffix' version to 5.1.1 to align with the latest standards.
- Adjusted webrick gem inclusion to be conditional based on Ruby version, ensuring compatibility for local development with Ruby 3.2 and above. This change reflects the need for webrick in local environments while acknowledging that GitHub Pages operates on Ruby 3.1.7, which does not require this gem.
- Introduced a new local configuration file (_config_local.yml) for local development.
- Updated Gemfile to include 'webrick' for Ruby 3.0+ compatibility and removed specific version constraints for 'github-pages'.
- Created a new Gemfile.local for local development with updated dependencies.
- Added multiple new lab sheets covering topics such as scanning, exploitation, and vulnerability analysis, enhancing the educational content.
- Improved lab layout and content presentation, including enhanced syntax highlighting and image handling.
- Added various images to support the new lab content and improve visual learning.
- Updated author display in lab metadata to handle multiple authors correctly.
- Added detailed command formatting instructions in the example highlighting guide, emphasizing the use of markdown code blocks and escaping pipe characters.
- Improved consistency in lab instructions by standardizing headings and formatting for clarity.
- Introduced a new lab on software vulnerabilities, exploits, and remote access payloads, providing a comprehensive overview of the topic.