Forum Widgets
Recent Discussions
Trick or Treat on Specter Street: Ghost of the SOC
I know it's one of the challenge labs but I'm fairly sure I'm missing something extremely straight forward, it's 100 point difficulty 4.... Someone help me please! I'm banging my head against a wall with this one! If anyone can point me in the right direction of the specific persistence mechanism I think that would be a start Q8. Use the service account to delete the spirit's persistence mechanism. The methods you employ to gain access to this account are up to you.0likes33CommentsRadare2 Reverse Engineering: Ep.2 – Windows Binary Part 2
I have run into a challenge with Question 3 on this lab. I can't seem to get the appropriate md5 hash value for the .text section to correctly answer this question. I feel that I am close but slightly off on one of the mandatory calculations. Any insight or guidance on what I'm missing / doing incorrectly would be greatly appreciated. Thanks in advance.Solved1like5CommentsIntroduction to Metasploit: Ep.3 – Discovery
#5 Select the arp_sweep module and run it against the victim IP address with THREADS set to 1. Is the host active or inactive? I can only see my AttackerIP. The host is up but how to see? RHOSTS 10.102.20.1/24 yes msf6 auxiliary(scanner/discovery/arp_sweep) > run SIOCSIFFLAGS: Operation not permitted [+] 10.102.136.8 appears to be up (UNKNOWN). [*] Scanned 256 of 256 hosts (100% complete) [*] Auxiliary module execution completed1like0CommentsCVE-2018-16858 (LibreOffice Remote Code Execution)
Hi there! I'm a little stumped on what 9 is prompting me to do? So it's asking me to open and modify 'bankdetails.odt' and to launch the file as 'cmd.exe' instead of .docx file, but when I right click on the 'bankdetails.odt' I don't really know what to select from the list to open as an extension as a .exe? Hope i've made sense?0likes0CommentsInvestigating IAM Incidents in AWS: Preparation
In this Lab, all Tasks can be completed successfully, with the exception of two steps: - Task 8: Proactive scanning with Prowler - Task 10: Preparing to detect leaked credentials Following the task instructions and executing the specified commands in the terminal, -- T8: prowler --profile prowler -c iam_user_hardware_mfa_enabled -- T10: cd ~/Desktop/metrolio-careers git secrets --install git secrets --register-aws git secrets --scan All commands above can be executed with successful responses, but it didn't detect the completion. Could you take a look and help me out? Thanks🙂Solved0likes3CommentsC++ Stack Overflow Purple Belt
Hello Community, I am stuck on Exploitation Development: Stack Overflow Part 2 lab. I have already determined how many characters are needed to overwrite the return address and also the location of win function. But I have not been able to construct the payload to enter it into the program to capture the flag. If someone could give some advise on this. It would be very appreciated. Best Regards0likes2Comments