Featured Content8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection BlogWant to design a CTF lab to share? 🤩🖥️Community Forum3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection Blog
3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
Cross_site Scripting DOM-based XSS vulnerability I am doing the Cross-Site Scripting (XSS) DOM-based XSS lab and I am trying to get the last step of the lab which is identifying the DOM-based XSS vulnerability. I am pretty sure it would not be so...SolvedModern Encryption Issue I'm on the last training under Modern Encryption training. I'm getting this error: ─$ openssl enc -des-ede3-cbc -d -pbkdf2 -nosalt -in encrypted_file_3DES.enc -out DES3 enter des-ede3-cbc decrypti...SolvedRansomware: LockBit I can't figure out what question 7 is looking for as the answer. I ensured I was looking at logs with an EventType of SetValue, I ensured it was LockBit.exe doing the event, but nothing I've tried fr...Immersive Labs – APT29: Threat Hunting with Splunk Hi everyone, I’m currently working through the Immersive Labs – APT29: Threat Hunting with Splunk lab and got stuck on Question 10. Question: A PowerShell script was initially executed to extract ...Investigating IAM Incidents in AWS: Preparation - Question 7 For the question: The ‘MetrolioQA’ IAM role in your account grants write access to a ‘metrolio’ role from another account. What is the full name of the external principle? I can't seem to find insi...SolvedMobile Malware: Anubis Malware (Offensive) - Question 8,9 despite obtaining the encrypted value, seems like RC4 decryption doesn't work with zanubis as the password. I am wondering where should I pivot into? For question 9: where should I look int...SolvedLab not getting complete even it is correct I am working on C# / ASP.NET API from the I am doing ASP.NET Core API: Username Enumeration lab, this lab task 1 is always showing incomplete even after I am generating correct results [HttpPost("...Want to design a CTF lab to share? 🤩🖥️ For this year's Community Challenge Series of labs, we want to see what you can make! Our Lab Builder allows users to build custom labs with the help of ai tooling. We'll give some guidance on...Webinar – Vishing & Deepfakes: Anatomy of a Multi-Vector Attack Registration is required. Clicking attend in the Community only sets a reminder. Social engineering has evolved from simple scams into sophisticated omni-channel attacks. As AI tools acceler...Virtual Crisis Sim – The AI Trend-Maker: Echo of the Puppetmaster Registration is required. Clicking attend in the Community only sets a reminder. Has the notorious Puppetmaster returned? Or is there a sinister copycat on the loose? Join us for a crisis...Lesson 7: Windows File Permissions I need help with question 4: The answer is clearly Administrators based on the screenshot. I would greatly appreciate assistance on this. Role for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)8 MIN READ Continuing on from the roles in the previous blog... Defensive Cyber D&D Class: The Fighter Saves: Strength and Constitution D&D Class Description: A master of all arms and armor. Reliab...
Tagshelp & support292immersive labs156challenges110defensive cyber99cyber threat intelligence84offensive cyber70application security68questions & feedback65cloud security62tips & tricks59