Live Simulated Cyber Attack on the UTSA Range
A vulnerable FTP server is used as an attack vector to steal data from a SQL database.
Linux is a powerful and widely used operating system, it is free and open source software. It can run on wide range of hardware platforms like desktops, servers, mobile devices and even supercomputers. Most of the top companies in the world use Linux servers. Linux is growing very rapidly and demand for Linux talent is on the rise. So acquiring Linux skills can help you land a job and get ahead in your career.
Your network is the target of a Man-in-the-Middle (MiTM) attack.
A successful phishing campaign leads to encrypted files and a ransom request.
An attack is used to halt SIEM services on your local network.
Trojan is used to disable a company's network management capabilities.
An outdated web server is the attack vector for a SCADA attack that completely cripples a plant.
A public web server is hit with a SQL Injection attack.