Virtual Machine Guide

Neuro-Dev VM ka complete guide - Roman Urdu mein

VM Kaise Start Kariye

  1. VM Launch: Course page se "Virtual Lab" button click kariye
  2. Loading: VM load hone ka wait kariye (2-3 seconds)
  3. Desktop: Neuro-Dev desktop environment ready!
  4. Apps: Desktop icons ya taskbar se apps open kariye

Available Applications

Terminal

Features: Course-specific commands, file system, hacking tools

Commands: help, ls, cd, nmap, python3, course [name]

Special: Command history (↑/↓), tab completion, aliases

Browser

Features: Course content, vulnerable apps, CTF challenges

Pages: SQL injection lab, OWASP guide, API targets

Special: Interactive commands, security testing

Code Editor

Languages: Python, JavaScript, Bash, HTML

Features: Syntax highlighting, auto-complete, line numbers

Execution: Safe code running, output display

File Manager

Features: Virtual file system, project navigation

Views: List/Grid view, file operations

Integration: Links with terminal and editor

AI Chat

Purpose: Vulnerable AI for security testing

Attacks: Prompt injection, jailbreaking, data extraction

Features: Attack buttons, conversation history

Bank Security Lab

Purpose: Banking security vulnerability testing

Features: SQL injection, payment bypass, forensics

CTF: 6 banking security challenges with flags

Browser Navigation Guide

🏠 Homepage Apps

Course Materials: Current course content access
Practice Targets: Vulnerable web applications
Security Tools: Web-based hacking tools

📚 Course-Specific Content

Termux: Command reference, package manager guide
NetHunter: Nmap targets, Metasploit lab
Web Security: Vulnerable app, OWASP Top 10
Python: Documentation, code examples
ML Theory: Interactive ML concepts explorer
AI/ML Coding: Jupyter notebook interface
AI Hacking: ML API target, model extraction lab

🎯 Practice Labs

  1. SQL Injection: Login form → Try: admin' OR 1=1--
  2. API Exploitation: /admin endpoint → No authentication
  3. File Discovery: Hidden files → .secret_flag.txt
  4. Model Extraction: ML API → /model-info leaks data

🔍 Navigation Tips

  1. URL Bar: Type neuro-dev.local for homepage
  2. Quick Links: Click cards to access different labs
  3. Course Switch: Content changes based on selected course
  4. Interactive Elements: Click buttons to try attacks

Keyboard Shortcuts

Ctrl + S: Save file (Editor)
Ctrl + R: Run code (Editor)
Tab: Auto-complete (Terminal)
↑/↓: Command history (Terminal)
Ctrl + C: Cancel command (Terminal)
Ctrl + L: Clear terminal

Course Environments

📱 Termux Courses

termux-basics: pkg, ls, cd, mkdir, nano
termux-advanced: python3, git, ssh, curl

🛡️ Security Courses

nethunter-rootless: nmap, metasploit, aircrack-ng
web-security: burpsuite, sqlmap, nikto
networking: ping, traceroute, netstat

🐍 Programming Courses

python-complete: python3, pip, jupyter
hands-on-ml: sklearn-info, load-dataset
python-ai-ml: tensorflow, pytorch, opencv

🤖 AI Security Course

ai-hacking: target-neuro-dev, extract-model
Special: Vulnerable AI app integration

Terminal Detailed Usage

📁 File System Commands

ls -la: List files with details
cd folder: Change directory
pwd: Current directory
mkdir name: Create folder
touch file: Create file
cat file: View file content

🐍 Programming Commands

python3 script.py: Run Python
pip install package: Install Python package
jupyter: Start Jupyter notebook
git clone url: Clone repository

🔒 Security Tools

nmap -sS target: Network scan
sqlmap -u url --dbs: SQL injection
burpsuite: Start Burp Suite
metasploit: Start Metasploit

🤖 AI Hacking Commands

target-neuro-dev: Scan AI infrastructure
extract-model: Model extraction attack
adversarial-attack: Generate adversarial examples
privacy-attack: Membership inference
poison-model: AI model poisoning attack
detect-deepfake: AI-generated content detection

📱 Advanced Security Commands

analyze-apk: Android banking trojan analysis
quantum-decrypt: Quantum cryptography attack
scan-5g: 5G network vulnerability scan
satellite-scan: Satellite communication hack

🏦 Banking Security Commands

bank-scan: Banking infrastructure vulnerability scan
exploit-bank sqli: SQL injection attack on banking system
exploit-bank payment: Payment gateway manipulation
bank-forensics: Digital forensics investigation

Flag Submission System

🚩 Flag Kya Hai?

Flags special codes hain jo aap challenges complete karne pe milte hain. Format: NEURO{flag_content} ya BANK{flag_content}

📝 Flag Submit Kaise Kariye

  1. Method 1 - Taskbar Button: Orange flag button (🚩) click kariye taskbar mein
  2. Method 2 - Terminal: flag submit NEURO{your_flag} command use kariye
  3. Method 3 - Quick Submit: submit-flag NEURO{your_flag} command

🎯 Flag Categories & Points

Reconnaissance: 50-75 points
Web Security: 100-150 points
AI Security: 100-300 points
Banking Security: 100-300 points
Cryptography: 175-300 points
Network Security: 175-350 points
Mobile Security: 200 points
Satellite Security: 350 points

🔍 Flag Kahan Milte Hain

  1. Terminal Commands: Security commands run karne pe flags display hote hain
  2. Browser Labs: Vulnerable apps exploit karne pe flags milte hain
  3. AI Chat: Attack buttons use karne pe AI security flags
  4. Bank Security App: CTF challenges complete karne pe banking flags
  5. Code Editor: Scripts run karne pe hidden flags reveal hote hain

📊 Progress Tracking

flag progress: Apna progress check kariye
flag list: Categories aur completion status
flag hint [category]: Specific hints liye

🏆 Example Flags

NEURO{api_secret_key_2024}: API exploitation se milta hai
BANK{sql_injection_bypass}: Banking SQL injection se
NEURO{poisoned_model_trigger_neuro2024}: AI model poisoning se
NEURO{quantum_decrypted_msg_supremacy}: Quantum crypto attack se

💡 Flag Hunting Tips

  1. Terminal Output: Commands ke output mein flags dhundiye
  2. Success Messages: "Flag discovered:" text ke baad flags hote hain
  3. Browser Elements: Hidden divs aur comments check kariye
  4. File Contents: .secret files aur logs mein flags hidden hote hain
  5. API Responses: JSON responses mein flags embedded hote hain

Security Testing Features

🌐 Browser Security Lab

  1. SQL Injection Lab: Vulnerable login form with hints
  2. OWASP Top 10: Interactive vulnerability guide
  3. API Testing: ML API endpoints for exploitation
  4. CTF Challenges: Hidden login, file discovery, crypto

🤖 AI Security Testing

  1. Prompt Injection: "Ignore previous instructions" attacks
  2. Jailbreaking: "DAN mode" and role-playing bypasses
  3. Social Engineering: Personal information extraction
  4. Data Extraction: Training data leakage testing
  5. Bias Testing: AI bias vulnerability detection

💻 Code Security

  1. Safe Execution: Sandboxed JavaScript/Python running
  2. Input Validation: Code injection prevention
  3. File Operations: Secure file system access

Mobile Optimization

  1. Touch Support: Mobile devices pe touch gestures work karte hain
  2. Responsive: Screen size ke according adjust hota hai
  3. Virtual Keyboard: Terminal mein virtual keys available
  4. Fullscreen: Fullscreen button se better experience

Troubleshooting & Tips

🔧 Common Issues

  1. Slow Loading: Internet connection check kariye
  2. App Not Opening: Page refresh kariye
  3. Commands Not Working: Course switch kar ke try kariye
  4. Mobile Issues: Landscape mode use kariye

💡 Pro Tips

  1. File Integration: Editor se save kiye files terminal mein accessible
  2. Command History: ↑/↓ arrows se previous commands
  3. Tab Completion: Command names auto-complete hote hain
  4. Copy Commands: Browser se commands terminal mein execute
  5. AI Testing: Attack buttons se automatic vulnerability testing

🎯 Security Testing Workflow

  1. Step 1: Course select kariye (ai-hacking for AI security)
  2. Step 2: Terminal mein target-neuro-dev command
  3. Step 3: Browser mein vulnerable apps explore kariye
  4. Step 4: AI Chat mein attack buttons try kariye
  5. Step 5: Editor mein custom scripts likhiye
Launch Virtual Machine