What's New?Most RecentNo Replies YetNo Solutions YetCommunity Newsletter - April 20252 MIN READ Hello from Immersive HQ in Bristol UK where last week we hosted our first ever in-person community meetup. Ever since we launched this community last September we've been keen to find ways to ...The Human Connection Challenge Lab 4: Linux Official Walkthrough Guide6 MIN READ Time’s Up! Congratulations to everyone who completed Lab 4: Linux from the Human Connection Challenge: Season 1. In this walkthrough, I'll share some strategies for efficiently completing the lab b...Need Help for Pwntools: Ep. 6 — Demonstrate Your Skills I'm trying to solve an lab in Immersive labs Pwntools: Ep. 6 — Demonstrate Your Skills And I got stuck in the last step. I've tried the solution for using cat2 (from https://www.reddit.com/r/immers...The Human Connection Challenge: Season 1 Episode 6 Is Now Live!2 MIN READ Welcome to the sixth instalment of the Human Connection Challenge: Season 1. This lab tests your ability to analyze and exploit Thick Client applications. As this is a challenge lab, you'll find limi...Anyone finished the "Etherium Smart Contracts"? Need help on three labs on the Ethereum smart contracts. I managed to do some but stuck on 3 of them so far: Ethereum: Contract Challenge 2 – Sisyphean Brute force the hash? E...Foundational Static Analysis: API Analysis Hi all, I'm stuck in this part, where using Ghidra, I have to find where the Windows API GetModuleHandleA is used, in the binary called exercise_two.exe, and once located, find the parameter of thi...PowerShell Deobfuscation: Ep 8 help I have been stuck on this EP for a week and haven't been able to progress. I am hoping someone can give me a hint to help me get through this one. Here is what I have done so far. I take the or...Combatting Software Vulnerabilities with GenAI Don’t miss this opportunity to stay ahead of evolving threats. Register now! Software vulnerabilities can expose organizations to costly data breaches and service interruptions. But with the right...Derrick's Doughnut Admin In the Intro to Web App Hacking: Mapping Web Applications course, the last step I'm instructed to: Return to the /login page and log in as the admin of the site. What is the token you receive? www...Your first lab level 9 What was the first level 9 lab you conquered? :). It does not matter that you will seek advice from other giants, or that you will manage to complete it on your own: share your journey with us!; to ...
Tagshelp & support148defensive cyber59cyber pro58cyber threat intelligence52application security45getting started35cloud security35offensive cyber35cyber crisis simulations32tips & tricks31