Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Zoom Links
    1 Topic
  3. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  4. Whatโ€™s in the Digital World?
    3 Topics
  5. Cyber Threats: Meet the Villains
    3 Topics
  6. The Cyber Defense Arsenal
    3 Topics
  7. The Art of the Hack
    3 Topics
  8. CTF: The First Mission
    2 Topics
  9. Red Ranger โ€“ Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  10. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  11. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  12. CTF Challenge โ€“ Network Defense
  13. Blue Ranger โ€“ Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  14. The Secret Language of Codes
  15. Modern Encryption: How Does It Work?
  16. Breaking the Code: Ethical Decryption
  17. CTF Challenge โ€“ Cryptography
  18. Yellow Ranger โ€“ Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
  19. Social Engineering: Trick or Treat?
  20. Web App Hacking: Finding Weak Spots
  21. CTF Challenge โ€“ Ethical Hacking
  22. Green Ranger โ€“ Threat Hunter (Sessions 19-20)
    Becoming a Threat Hunter
  23. CTF Challenge โ€“ Threat Hunting
  24. Module 3: Cyber Crisis Simulations
    Incident Response: Save the Cityโ€™s Power Grid!
  25. Data Breach Mystery: Find the Insider
  26. Ransomware Attack: Pay or Fight?
  27. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  28. Final Mission: Defend Cyber City
  29. Cyber Ranger Graduation
  30. Where to Next? Exploring Cybersecurity Careers
  31. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  32. Red Team vs. Blue Team
  33. Advanced Forensics
  34. OSINT Challenges
  35. Spy Games
  36. Lockpicking 101 (Virtual)
  37. Defusing a Virtual Bomb
  38. AI in Cybersecurity
  39. Create Your Own CTF Challenge
  40. Internet of Things (IoT) Hacking
  41. Cyber Rangers Hall of Fame
Lesson 7, Topic 1
In Progress

Lesson Companion – The Art of the Hack

Cyber School 07/10/2025
Lesson Progress
0% Complete

Lesson Companion: The Art of the Hack
How Hackers Break In โ€” and What We Can Learn From Them
๐Ÿ“ Use this guide to take notes, answer key questions, and reflect as you follow todayโ€™s presentation and lab.


๐ŸŽฏ What I Will Learn Today

  • The six stages of a real-world cyberattack
  • How hackers think and what tools they use
  • The difference between ethical and malicious hacking
  • How to analyze websites for common security weaknesses
  • Why itโ€™s important to defend systems before they are attacked

๐Ÿ““ Notes by Topic


๐Ÿง  What Is Hacking?

Hacking originally meant:
๐Ÿ–Š _______________________________________________________

Today, it often refers to:
๐Ÿ–Š _______________________________________________________

Types of hackers:

TypeDescription
White Hat________________________________________
Black Hat________________________________________
Gray Hat________________________________________

๐Ÿ”Ž The Hackerโ€™s Mindset

Hackers donโ€™t try to break whatโ€™s strong โ€” they look for whatโ€™s:
๐Ÿ–Š _______________________________________________________

They rely on:

  • Logic and observation
  • Weak security or human mistakes
  • Tools that are easy to find online

๐Ÿ”— The 6-Stage Attack Chain

StageWhat Happens
1. Reconnaissance_________________________________
2. Scanning_________________________________
3. Access_________________________________
4. Payload_________________________________
5. Escalation_________________________________
6. Exfiltration_________________________________

๐Ÿงฐ Hacker Toolkit

Tools often used by attackers:

  • Port scanners (e.g. Nmap)
  • Password crackers (e.g. Hydra)
  • Keyloggers
  • Malware generators
  • Social engineering kits

๐Ÿ–Š Write one tool you learned about and what it does:



๐Ÿ” Real-World Examples

Case 1: A student hacked the school gradebook
๐Ÿ–Š What was the weak point? _____________________________

Case 2: Ransomware attack on a hospital
๐Ÿ–Š How did it start? ____________________________________
๐Ÿ–Š What was the damage? _______________________________


๐Ÿ” Practice: Spot the Flaws

What are some common flaws hackers look for?
โ˜ Weak passwords
โ˜ Public data online
โ˜ Open ports
โ˜ Users who click links without checking

๐Ÿ–Š Add one more weakness you learned about:



๐Ÿงช Lab Activity: โ€œFind the Weak Linkโ€

Goal: Use browser tools to inspect a challenge website and simulate a hackerโ€™s early steps.

During the lab, I will:
โ˜ Open Developer Tools (Inspect Element)
โ˜ View HTML and JavaScript
โ˜ Look for hidden fields, weak code, or exposed credentials
โ˜ Try modifying inputs or checking script logic
โ˜ Analyze how a real hacker might exploit this


๐Ÿ’ฌ Lab Reflection

๐Ÿ–Š What was the most interesting thing you found?


๐Ÿ–Š What made the site vulnerable?


๐Ÿ–Š How could a developer fix it?



๐Ÿ›ก๏ธ Cyber Ethics

What makes a hacker ethical?

  • Always has _________________________
  • Works to ___________________________
  • Never uses skills to ________________

โœ… Cyber Rangers use knowledge to protect โ€” not to harm.


๐Ÿ’ก Final Reflection

  1. What did you learn about how real hackers work?
    ๐Ÿ–Š _____________________________________________________
  2. How does knowing this help you be a better defender?
    ๐Ÿ–Š _____________________________________________________
  3. What will you look out for in your own digital life?
    ๐Ÿ–Š _____________________________________________________