Back to Academy

VCA-ADV-101 — Adversarial Techniques: CVE-to-Tool

The direct follow-on to VCA-RE-101. Students take a published CVE for the course’s primary target (the Motorola/ARRIS SURFboard SB6141), reproduce the vulnerability manually, then convert their manual reproduction into a responsible, authorization-gated testing tool that a professional analyst could legitimately hand to a client engagement. The course is not “how to hack modems.” It is “how a security researcher, acting under authorization, turns a disclosed weakness into an auditable proof artifact.”

Duration: 11 weeks
Position: 12th Grade Spring (or post-RE-101 adult track)
Prereq: VCA-RE-101
Credential: VCA-ADV-101 Certificate of Completion
Register interest — we’re not taking enrollments yet. Email academy@virtuscybersecurity.com.

Why This Vulnerability

Primary teaching CVE — unauthenticated CSRF on the SB6141 admin interface. The device exposes an administrative web interface requiring no authentication from the cable-side LAN. A crafted HTTP request — even one originating from the victim’s own browser visiting an attacker-controlled page — can trigger administrative actions including reboot and factory reset. David Longenecker disclosed this in 2016; ARRIS acknowledged; ISPs eventually pushed a firmware update. Lab-owned units still run pre-patch firmware, making them suitable authorized teaching targets.

Chosen because: pedagogical simplicity (reproducible with curl in one lab session), real-world register (named researcher, disclosure timeline, vendor response), ethical clarity (lab-owned isolated target), tool-engineering surface (authorization gating, logging, rollback, safe-defaults all matter), and continuity with the RE-101 target device.

Learning Outcomes

  1. Read a CVE record end-to-end and identify what a reproducing researcher would need.
  2. Establish an isolated, authorized test network for vulnerability validation on a lab-owned target.
  3. Manually reproduce a disclosed vulnerability and articulate preconditions and effects.
  4. Convert a manual reproduction into a reusable Python tool that requires explicit authorization input, logs every action, fails safe, and produces an auditable run artifact.
  5. Engineer the tool with appropriate safety engineering — authorization gates, scope limits, dry-run mode, idempotent operation, user-visible logging, and destructive-action confirmation.
  6. Produce a coordinated-disclosure-ready report under CERT/CC CVD practice (ISO/IEC 29147).
  7. Identify the legal and ethical boundaries of adversarial testing under U.S. law (CFAA, DMCA §1201, state computer-crime statutes).
  8. Defend the tool orally in a simulated client-briefing setting.

Weekly Schedule

WeekTopicLaboratory
1Foundations — adversarial posture, authorization as the dividing line, CVE records as professional literatureRead and annotate the SB6141 Longenecker CVE; reproduce nothing yet
2HTTP at the wire level; CSRF mechanicsReproduce the CSRF manually with curl on the lab SB6141
3Isolated lab networks; authorization basis for this targetBuild the isolated lab network; document authorization
4Python requests, argparse, logging, exit codesTool v0.1 — fingerprint only (is this an SB6141?)
5Tool safety engineering I — authorization gates, dry-run, destructive-action confirmationsTool v0.2 — adds --authorized-by flag and dry-run
6Midterm practical — reproduce a different CVE manually on a different authorized targetProctored 3-hour exam
7Tool safety engineering II — logging, auditable artifacts, rollback, idempotencyTool v0.3 — adds run-log output and validation
8CVSS and impact scoringScore the chosen CVE and justify the score
9Coordinated vulnerability disclosure — CERT/CC, ISO/IEC 29147Draft the disclosure report for a hypothetical novel finding
10Professional ethics; CFAA; DMCA §1201; state law variation; SDVOSB engagement rulesWrite a 2-page personal ethics statement
11Capstone defense preparation; report and tool reviewSubmission and peer review

Capstone — Tool + Disclosure-Ready Report

The tool must:

  • Fingerprint the target and refuse to run if the target isn’t what it expects
  • Require an explicit --authorized-by argument naming a lawful authorization source
  • Support --dry-run mode that demonstrates intent without taking effect
  • Produce a structured log artifact (JSON + human-readable) of every action
  • Require explicit user confirmation before any destructive or persistence-altering action
  • Pass an instructor-provided test suite on the lab target
  • Ship as a proper Python package with README, LICENSE, and CHANGELOG

The report must:

  • Describe the vulnerability at the level of a CERT/CC disclosure document
  • Document reproduction steps sufficient for an independent engineer to repeat
  • Score the impact via CVSS v3.1 with per-metric justification
  • Recommend remediation and, separately, mitigation
  • Include an explicit negative-scope “what this tool does not do” section

Ethics Framework (Embedded Throughout)

The course operates under an explicit discipline: the tool exists to test lab-owned targets under written authorization, and only such targets. Codified in three artifacts each student signs:

  1. Course AUP — scope restrictions, signed Week 1.
  2. Per-session authorization log — each lab begins with a one-line written authorization statement.
  3. The tool’s own code — the --authorized-by flag is not decorative. A tool that can run without it fails the capstone.

Required Hardware & Software

  • Same as VCA-RE-101 — student’s own SB6141 (lab-owned), laptop or lab Pi, and an isolated network switch or dedicated VLAN. No new purchases.
  • The same fwlab container as RE-101, augmented with requests, pytest, and scapy.
  • Burp Suite Community Edition for Week 2 HTTP inspection.

Certification Alignment

OSCP Prep

Long-term preparation for OffSec OSCP (available post-18). Graduates who pursue OSCP after the course are generally ready for the OffSec PEN-200 self-study path within 3–6 months.

Interested in VCA-ADV-101?

Email academy@virtuscybersecurity.com with your register and why.

Email academy@virtuscybersecurity.com