
File System and Disk Management
Learn essential Linux file system and disk management skills in this hands-on lab. Learn to use key commands like df, du, dd, and fdisk to monitor disk usage, manage virtual disks, and maintain file system integrity. This lab provides practical experience in tasks crucial for system administrators and power users.
Linux

User Account Creation
In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux

Installing Virtual RAM Modules
In this lab, you will learn how to increase the virtual memory of a Linux system by creating, enabling, and managing a swap file, which acts as virtual RAM.
Linux

Setting Up IP Addressing
In this lab, you will learn how to configure a static IP address on a Linux system using netplan, and then revert the configuration back to DHCP.
Linux

File System Navigation
In this lab, you will learn the fundamental Linux commands for file system navigation, including listing files, creating directories, and copying, moving, and removing files and directories.
Linux

Software Installation and Updates
In this lab, you will learn the fundamental process of managing software on a Debian-based Linux system. You will practice updating package lists, installing, upgrading, listing, and removing software using the `apt` and `dpkg` command-line tools.
Linux

Resolving Network Connectivity Problems
In this lab, you will learn how to diagnose and resolve a common network connectivity issue on a Linux system: DNS resolution failure. You will learn to isolate the problem, inspect DNS settings, correct them, and verify the fix.
Linux

Enabling Basic Firewall
In this lab, you will learn how to install and configure the Uncomplicated Firewall (UFW) on a Linux system to manage basic network security rules.
Linux

Implementing File Permissions
In this lab, you will learn the fundamental Linux commands for managing file and directory permissions, including creating files, changing permissions with chmod, and altering ownership with chown.
Linux

Testing Network Connectivity
In this lab, you will learn fundamental Linux commands to test and troubleshoot network connectivity, from checking the local machine to resolving external hostnames.
Linux

Create User Account in Kali
In this challenge, you'll be tasked with creating a new user account named 'bob' on a Kali Linux system. This is a fundamental skill for cybersecurity professionals, allowing them to manage user access and permissions. The challenge involves using the `adduser` command to create the 'bob' user, setting a password, and skipping the optional information prompts. Successful completion will be verified by confirming the user's existence using the `id bob` command and checking the command history for the `adduser bob` command.
Kali Linux

Scan Network Ports with Nmap
In this challenge, you'll step into the role of a cybersecurity intern tasked with auditing a server's security. Your objective is to utilize Nmap to identify open ports on a target system with the IP address `172.17.0.1`. Save the scan results to `/root/open_ports.txt`.
Kali Linux

Kali Reconnaissance with Nmap and DNS
In this lab, explore reconnaissance techniques using Kali Linux with a focus on network scanning and DNS querying. Learn to identify open ports and services with Nmap, enumerate services using scripts, query DNS records with dnsrecon, and save output for analysis, all within a secure LabEx VM environment.
Kali Linux

How to check if the system is 32-bit or 64-bit in Linux
In this lab, you will learn how to determine if your Linux system is 32-bit or 64-bit using command-line tools like `uname -m` and `arch`. You will execute these commands, interpret their output, and inspect binary files to understand your system's architecture and ensure software compatibility.
Linux

Kali Password Cracking with John
In this lab, explore password cracking with Kali Linux using John the Ripper on the LabEx VM. Learn to crack Linux password hashes from /etc/shadow, use custom wordlists, compare with Hashcat, and save results. Perfect for beginners, this hands-on lab offers step-by-step guidance for penetration testing skills.
Kali Linux

Start Metasploit Console
In this challenge, you'll take your first steps as a cybersecurity analyst by familiarizing yourself with Metasploit. Your objective is to start the Metasploit framework console. To complete this challenge, simply execute the `msfconsole` command in the terminal.
Kali Linux

Add New Partitions and Logical Volumes
In this challenge, you will learn how to configure local storage on a Linux system by adding new partitions and logical volumes, as well as creating a swap space, without causing any data loss.
Red Hat Enterprise Linux

Kali Firewall Configuration with iptables
In this lab, you will learn to configure a firewall on Kali Linux using iptables. Explore essential skills like viewing rules, blocking IP addresses, allowing specific ports, and saving configurations. Gain hands-on experience in a Kali Linux container environment to enhance network security through effective traffic filtering.
Kali Linux