Featured Content8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection BlogWant to design a CTF lab to share? 🤩🖥️Community Forum3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection Blog
3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
Hafnium: Detection of IoCs - Question 5 For the Which web shell in the auth folder matches those detected in the Microsoft report? What does the question mean by Microsoft Report? is it talking about the PowerShell ISE output? ev...Apache Header Tampering Can someone point me to the right track? On this one, I found the hidden directory, used an X-Forwarded-For: to see into that directory where scanning for files showed a lot of 404s, with just a few ...Ransomware: Darkside - Question 9 In terms of determining the name of the service that is installed after the ransomware was executed, there doesn't seem to be any service installation activities observed from the endpoint. Wonde...Ransomware: Darkside - Question 8 For some reason there is no data in the Splunk terminal despite running the malware, I am wondering about why that may be an issue or if I should be looking else where? SolvedVirtual Crisis Sim – The AI Trend-Maker: Echo of the Puppetmaster Has the notorious Puppetmaster returned? Or is there a sinister copycat on the loose? Join us for a crisis simulation where the line between a viral prank and a high-stakes emergency is razor...Webinar – Vishing & Deepfakes: Anatomy of a Multi-Vector Attack Social engineering has evolved from simple scams into sophisticated omni-channel attacks. As AI tools accelerate the discovery of system vulnerabilities, adversaries are shifting their focus tow...AI Blue Teaming Foundations: Introduction to AI Blue Teaming (Part 2) - Q7 Impossible https://iml.immersivelabs.online/v2/labs/ai-blue-teaming-foundations-introduction-to-ai-blue-teaming-part-2 Is it just me? OR is this lab impossible to complete? Modern Encryption Issue I'm on the last training under Modern Encryption training. I'm getting this error: ─$ openssl enc -des-ede3-cbc -d -pbkdf2 -nosalt -in encrypted_file_3DES.enc -out DES3 enter des-ede3-cbc decrypti...SolvedCross_site Scripting DOM-based XSS vulnerability I am doing the Cross-Site Scripting (XSS) DOM-based XSS lab and I am trying to get the last step of the lab which is identifying the DOM-based XSS vulnerability. I am pretty sure it would not be so...SolvedRansomware: LockBit I can't figure out what question 7 is looking for as the answer. I ensured I was looking at logs with an EventType of SetValue, I ensured it was LockBit.exe doing the event, but nothing I've tried fr...Immersive Labs – APT29: Threat Hunting with Splunk Hi everyone, I’m currently working through the Immersive Labs – APT29: Threat Hunting with Splunk lab and got stuck on Question 10. Question: A PowerShell script was initially executed to extract ...Investigating IAM Incidents in AWS: Preparation - Question 7 For the question: The ‘MetrolioQA’ IAM role in your account grants write access to a ‘metrolio’ role from another account. What is the full name of the external principle? I can't seem to find insi...Solved
Tagshelp & support295immersive labs160challenges110defensive cyber99cyber threat intelligence84offensive cyber71application security68questions & feedback68cloud security62tips & tricks59