Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
NSE Lab
Hacking Guides
Planning
Exploitation
Reporting
Wireless Hacking
Wireshark
Wi-Fi MITM
Bluetooth
Overview of LTE Hacking
SOHO Device Exploitation
Ubertooth One
ARP Spoofing and MitM attacks
Hardware Hacking
0x01 - Analyzing UART
0x02 - Analyzing I2C
0x03 - Analyzing SPI
0x04 - Analyzing JTAG
0x05 - Analyzing eMMC
0x06 - Useful links and tutorials
Radio Hacking
0x01 - Analyzing SDR
0x02 - Analyzing ZigBee
0x03 - Analyzing BLE
HackRF One
Firmware Hacking
Fuzzing
Introduction to Clusterfuzz
Configuring the lab's Clusterfuzz service
Start/stop the Service
Web Hacking
0x01 - Injection Attacks
0x02 - Broken Authentication
0x03 - Sensitive Data Exposure
0x04 - XML External Entities (XXE)
0x05 - Broken Access Control
0x06 - Security Misconfiguration
0x07 - Cross Site Scripting (XSS)
0x08 - Insecure Deserialization
0x09 - Using Components with Known Vulnerabilities
0x10 - Insufficient Logging and Monitoring
0x11 - HTTP Request Smuggling
Creating Threat Models
Prerequisites
MAL
DSL
coreLang
Reporting CVEs
Thesis Guidelines
Registration
Objective
Choice of System to Explore
Things to hack
Request a Purchase
Delimitations
Method
Theory
Related work
Thesis Report
Threat Traceability Matrix
Grading criteria
Language
Tutoring
Responsible disclosure
The Law
Cyber Security Lab
Lab Equipment
IoT Devices
Hacking Tools
Computers & Hardware
Books
Lab Servers
VPN
Request Device Purchase
Return of the Lab's Devices
Previous Work
Published Theses
Media Coverage
Social Media
Gallery
The Lab
Visit from the Swedish Royal Family
Contribute
Feedback
Home
NSE Hacking Lab
Teknikringen 33, 10044
Stockholm, Sweden
Previous Work
Social Media
Social Media
Youtube
Check out the lab’s Youtube channel
here
!