Featured ContentIntroduction to Immersive One (In Under 30 Minutes)Events4 MIN READWant to Become a CrowdStrike Falcon® Pro?The Human Connection BlogVirtual Crisis Sim – The Heartbolt Heist: Love, Lies, and LeaksEventsThe Cyber Readiness Outlook: 2025 Threat Reflection and 2026 ForecastEvents
Git Security: Git History Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tri...No files show up in the Microsoft Azure Basics: Function Apps lab Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES in...Introduction to Detection Engineering: Ep.5 – Custom Alerting I've spent too much time trying to figure this out. SolvedAI Plugin Injection Greetings, I've found the old plugin that should ideally be used to get the AI to give access to token.txt But no matter how many times I try, directoryListingPluginOld and whatever Linux commands...Jinja2 Pen test i am completely stumped in this email limit issue, restricted with [] () .. using ?x= just prints the data as is.. and doesnt evaluate the requests.. can anyone help on this.. stuck on it since 3 we...Modern Maze1 MIN READ The Maze Challenge consists of a series of eight “mazes” of increasing complexity based on real-world-inspired cyber attack scenarios, testing a variety of offensive skills, such as web, infrastructu...Powershell Deobsfuscation Ep.7 I was working on this and got stuck with Ep.7. Appreciate if anyone can assist with this Powershell de-obfuscation. Step 1: I removed the splits accordingly and converted from hexadecimal Step ...SolvedCTI First Principles: Threat Actors and Attribution Question 8 For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the...PowerShell Basics: Demonstrate Your Skills Hi, I'm a little stumped on Q10 and was wondering if I could please get some help. I have used the Invoke-Command once script.ps1 was copied over from my local machine to Server 1 and established...Intro to Python Scripting Building an IDS I am stuck on task 5 of the lab and het this error: from scapy.all import sniff from scapy.layers.inet import IP, TCP ip_connections = {} PORT_SCAN_THRESHOLD = 10 def packet_callback(packet): i...Agents Skill-Building with Gemini CLI Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some...SolvedWhich equation does Metrolio use to calculate the maximum speed? I am stuck at this question from lab 10... can anybody point out to correct answer to complete the lab
Tagshelp & support282immersive labs137challenges107defensive cyber96cyber threat intelligence81offensive cyber68application security67cloud security60questions & feedback59cyber pro58