Featured Content8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection BlogWant to design a CTF lab to share? 🤩🖥️Community Forum3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 2)The Human Connection Blog
8 MIN READRole for Initiative: Mapping Cybersecurity Jobs to D&D Classes (PART 1)The Human Connection Blog
3 MIN READGrow Your Career Leaning Into a New Tool Your Manager Will Rely OnThe Human Connection Blog
Apache Header Tampering Can someone point me to the right track? On this one, I found the hidden directory, used an X-Forwarded-For: to see into that directory where scanning for files showed a lot of 404s, with just a few ...Ransomware: Darkside - Question 9 In terms of determining the name of the service that is installed after the ransomware was executed, there doesn't seem to be any service installation activities observed from the endpoint. Wonde...Ransomware: Darkside - Question 8 For some reason there is no data in the Splunk terminal despite running the malware, I am wondering about why that may be an issue or if I should be looking else where? SolvedVirtual Crisis Sim – The AI Trend-Maker: Echo of the Puppetmaster Has the notorious Puppetmaster returned? Or is there a sinister copycat on the loose? Join us for a crisis simulation where the line between a viral prank and a high-stakes emergency is razor...Webinar – Vishing & Deepfakes: Anatomy of a Multi-Vector Attack Social engineering has evolved from simple scams into sophisticated omni-channel attacks. As AI tools accelerate the discovery of system vulnerabilities, adversaries are shifting their focus tow...AI Blue Teaming Foundations: Introduction to AI Blue Teaming (Part 2) - Q7 Impossible https://iml.immersivelabs.online/v2/labs/ai-blue-teaming-foundations-introduction-to-ai-blue-teaming-part-2 Is it just me? OR is this lab impossible to complete? Modern Encryption Issue I'm on the last training under Modern Encryption training. I'm getting this error: ─$ openssl enc -des-ede3-cbc -d -pbkdf2 -nosalt -in encrypted_file_3DES.enc -out DES3 enter des-ede3-cbc decrypti...SolvedCross_site Scripting DOM-based XSS vulnerability I am doing the Cross-Site Scripting (XSS) DOM-based XSS lab and I am trying to get the last step of the lab which is identifying the DOM-based XSS vulnerability. I am pretty sure it would not be so...SolvedRansomware: LockBit I can't figure out what question 7 is looking for as the answer. I ensured I was looking at logs with an EventType of SetValue, I ensured it was LockBit.exe doing the event, but nothing I've tried fr...Immersive Labs – APT29: Threat Hunting with Splunk Hi everyone, I’m currently working through the Immersive Labs – APT29: Threat Hunting with Splunk lab and got stuck on Question 10. Question: A PowerShell script was initially executed to extract ...Investigating IAM Incidents in AWS: Preparation - Question 7 For the question: The ‘MetrolioQA’ IAM role in your account grants write access to a ‘metrolio’ role from another account. What is the full name of the external principle? I can't seem to find insi...SolvedMobile Malware: Anubis Malware (Offensive) - Question 8,9 despite obtaining the encrypted value, seems like RC4 decryption doesn't work with zanubis as the password. I am wondering where should I pivot into? For question 9: where should I look int...Solved
Tagshelp & support294immersive labs159challenges110defensive cyber99cyber threat intelligence84offensive cyber71application security68questions & feedback68cloud security62tips & tricks59