⚓ Shipwreck Ex

Security Practice Labs

Apply security concepts through interactive challenges covering firewalls, intrusion detection, and penetration testing scenarios

Start Lab Ethical Hacking

Firewall Rules

Configure iptables, implement network ACLs, and analyze traffic patterns in a simulated border gateway

$ sudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT
$ sudo iptables -A INPUT -p tcp --dport 22 -j DROP
$ sudo iptables -L -v
                

Hacking Simulations

Practice penetration testing techniques in a controlled sandboxed environment

$ nmap -sS 192.168.1.0/24
$ msfconsole exploit/multi/http/tomcat_mgr_upload
                

Real Network Defense Scenarios

DDoS Mitigation

Configure iptables rate limits and analyze traffic patterns during simulated attacks

Challenge Status: ⏳ In Progress

Log Analysis

Analyze syslog entries to identify intrusion attempts and anomalous behavior

Challenge Status: ✅ Complete

IDS Configuration

Set up and tune Snort rules to detect zero-day attack patterns

Challenge Status: ⏳ In Progress

Security CLI Terminal

$ sudo grep 'Failed' /var/log/auth.log
Aug 9 10:07:30 sshd[1234]: Failed password for root from XX.XX.XX.XX port 65045 ssh2
Aug 9 10:07:30 sshd[1234]: Failed password for root from XX.XX.XX.XX port 65038 ssh2

$ iptables -A INPUT -p tcp --dport 22 -m connlimit --connlimit-above 1 -j DROP

Your Security Progress

78%

Security Mastery

64/248 modules complete

  • IDS/IPS - 100%
  • Firewalls - 45%
  • Encryption - 78%
  • Pen Testing - 8%