Featured Content4 MIN READWant to Become a CrowdStrike Falcon® Pro?The Human Connection BlogVirtual Crisis Sim – The Heartbolt Heist: Love, Lies, and LeaksEventsThe Cyber Readiness Outlook: 2025 Threat Reflection and 2026 ForecastEvents3 MIN READIt’s Not Magic, It’s Mechanics: Demystifying the OWASP Top 10 for AIThe Human Connection Blog
3 MIN READIt’s Not Magic, It’s Mechanics: Demystifying the OWASP Top 10 for AIThe Human Connection Blog
Jinja2 Pen test i am completely stumped in this email limit issue, restricted with [] () .. using ?x= just prints the data as is.. and doesnt evaluate the requests.. can anyone help on this.. stuck on it since 3 we...2026 Welcome new members! It's been a while since we welcomed new members, so here we go: Manuela mark-o88 DaveH jsmith2099 chaosunix davidfong0 JanoJAFranke alg Cyber_vigilanty Waineo sarahp TomasSz account3448...Want to Become a CrowdStrike Falcon® Pro?4 MIN READ Welcome back to our series, “Behind the Scenes of Immersive One”! The following is a conversation with BenMcCarthy, Lead Cybersecurity Engineer for Immersive One, and RebeccaSchimmoeller, Lead Pro...PowerShell Basics: Demonstrate Your Skills Hi, I'm a little stumped on Q10 and was wondering if I could please get some help. I have used the Invoke-Command once script.ps1 was copied over from my local machine to Server 1 and established...IoT & Embedded Devices: Certificate Underpinning I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I...New CTI Lab: Lotus Blossom Notepad ++ Campaign: Analysis2 MIN READ In January 2026, threat researchers at Rapid7 detailed a sophisticated supply chain attack targeting the Notepad++ update mechanism. Between July and October 2025, attackers compromised the project’s...Modern Maze Anyone managed to solve this one? I've got RCE but can't figure out the lateral movement 😭 SolvedModern Maze1 MIN READ The Maze Challenge consists of a series of eight “mazes” of increasing complexity based on real-world-inspired cyber attack scenarios, testing a variety of offensive skills, such as web, infrastructu...Elastic Data Ingest: Demonstrate Your Skills Q9 I have found the answers to all the other questions including 10 but I don't quite understand what Q9 is asking for when it says "Shortly after this file was created, two temp files were also created...The Cyber Readiness Outlook: 2025 Threat Reflection and 2026 Forecast #Recorded on Jan 22nd 2026 Cybersecurity, from threat actors to the defensive strategies deployed against them, is undergoing a radical shift, forcing leaders to aggressively realign their st...Network Hardening Lab Recommendations I've been looking for some good training resources for network hardening. I've been working through the Windows Hardening collection and found it really useful. Are there any other lab recommendation...SolvedInfrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers Can anyone help me with this question: Obtain a reverse Meterpreter session. What is the group ID of the current user? I have used the exploit exploit(windows/smb/psexec) to get the second token....
Tagshelp & support277immersive labs129challenges106defensive cyber96cyber threat intelligence80offensive cyber68application security67cloud security60cyber pro58welcome56