html web templates

X — 2069 Chapter

In 2069: Chapter X , the tenth installment of the ambitious Project Chronos series, author/creator [Fictional Creator Name] abandons the high-octane space operas of previous entries for something far more unnerving: the quiet apocalypse. The year is 2069—a century after Woodstock and the moon landing, but also fifty years after the Great Climate Tipping Point of 2019-2025. Society hasn't collapsed in fire; it has crumbled in slow motion, replaced by a hyper-efficient, eerily peaceful corporate feudalism.

The "X" in the title is a triple entendre: the 10th chapter, the unknown variable, and the Roman numeral for ten, referencing the ten remaining "Bio-Habitat Zones" on Earth. The story follows Kaelen Voss, a "Memory Auditor" for the Pan-Asian Resource Alliance (PARA). His job is to delete traumatic memories from citizens to maintain "social equilibrium." But when he is assigned to audit the mind of a dying ecoterrorist known only as The Gardener , he discovers that his own memories have been redacted—and that the year might actually be 2069... or something else entirely. 2069 Chapter X

2069: Chapter X is not a comfort read. It is a mirror wrapped in chrome and smeared with rain. It works brilliantly as a standalone meditation on memory, consent, and the lies we tell ourselves to get through the day. However, if you are new to the series, —the emotional weight depends on knowing how the world got to 2069. In 2069: Chapter X , the tenth installment

8.5/10 – Essential, unsettling, and unforgettable. Just bring your own hope. The "X" in the title is a triple

Rating: ★★★★☆ (4.5/5) Genre: Hard Sci-Fi / Dystopian Thriller Vibe: Blade Runner meets Black Mirror meets The Expanse

Lab Setup

You can build your own lab as elaborate as you would like. However, for the purpose of this class, the following virtual machines (VMs) will be used.

WebSploit

Kali + Additional Tools + Vulnerable Applications in Docker containers...

Raven

A vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

VTCSEC

Another vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

X — 2069 Chapter

This video explains how to setup the virtual machines in your system using Virtual Box.

Topology

The diagram below shows the lab architecture with WebSploit Full version, Raven, and VTCSEC. The VMs were created in Virtual Box. It is highly recommended that you use Virtual Box. However, if you are familiar with different virtualization platforms, you should be able to run the VMs in VMWare Workstation Pro (Windows), VMWare Fusion (Mac), or vSphere Hypervisor (free ESXi server). 

You should create a VM-only network to deploy your vulnerable VMs and perform several of the attacks using WebSploit (Kali Linux), as shown in the video above. You can configure a separate network interface in your WebSploit VM to connect to the rest of your network and subsequently the Internet. Preferably, that interface should be in NAT mode.

Mobirise

LAB GUIDES

Lab guides will be distributed during class...

Omar's Cybersecurity GitHub Repository 

Over 8,000 cybersecurity references related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. 

Stay in Touch with Omar!

© Copyright 2020, Omar Santos - All Rights Reserved