Featured ContentIntroduction to Immersive One (In Under 30 Minutes)Events4 MIN READWant to Become a CrowdStrike Falcon® Pro?The Human Connection BlogVirtual Crisis Sim – The Heartbolt Heist: Love, Lies, and LeaksEventsThe Cyber Readiness Outlook: 2025 Threat Reflection and 2026 ForecastEvents
New CTI Lab: CVE-2025-49113: Investigating a Roundcube RCE2 MIN READ In February 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-49113 to its Known Exploited Vulnerabilities (KEV) catalogue following exploitation in the wild. This crit...Help with Snort Rules: Fake Tech Support Popup I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000...SolvedGemini CLI Lab issue Hi, I'm running into an error when trying to access the sandboxes lab in the Building with AI: Gemini CLI. It is probably something general and has been there for weeks so this is not letting me fini...No files show up in the Microsoft Azure Basics: Function Apps lab Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES in...AI Plugin Injection Greetings, I've found the old plugin that should ideally be used to get the AI to give access to token.txt But no matter how many times I try, directoryListingPluginOld and whatever Linux commands...Virtual Crisis Sim – The Heartbolt Heist: Love, Lies, and Leaks DateDash promised a service to "Save Your St. Valentine", but a secret project and sophisticated social engineering have turned a senior executive into your most significant liability. In this LI...Git Security: Git History Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tri...Introduction to Detection Engineering: Ep.5 – Custom Alerting I've spent too much time trying to figure this out. SolvedJinja2 Pen test i am completely stumped in this email limit issue, restricted with [] () .. using ?x= just prints the data as is.. and doesnt evaluate the requests.. can anyone help on this.. stuck on it since 3 we...Modern Maze1 MIN READ The Maze Challenge consists of a series of eight “mazes” of increasing complexity based on real-world-inspired cyber attack scenarios, testing a variety of offensive skills, such as web, infrastructu...Powershell Deobsfuscation Ep.7 I was working on this and got stuck with Ep.7. Appreciate if anyone can assist with this Powershell de-obfuscation. Step 1: I removed the splits accordingly and converted from hexadecimal Step ...SolvedCTI First Principles: Threat Actors and Attribution Question 8 For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the...
Tagshelp & support283immersive labs139challenges107defensive cyber96cyber threat intelligence82offensive cyber68application security67questions & feedback61cloud security60cyber pro58