Forum Widgets
Recent Discussions
Network Hardening Lab Recommendations
I've been looking for some good training resources for network hardening. I've been working through the Windows Hardening collection and found it really useful. Are there any other lab recommendations similar to this? In particular hardening things such as PfSense firewalls, Vyos routers, Linux endpoints etc.SolvedElastic Data Ingest: Demonstrate Your Skills Q9
I have found the answers to all the other questions including 10 but I don't quite understand what Q9 is asking for when it says "Shortly after this file was created, two temp files were also created. What is the last 6 characters in the name of these temp files?" . I have found the files created after q8 answer see below but as far as I can see no combination of the perfstringbackup.tmp file is being accepted (have tried including the file extension and not) . Any guidance on what the question is actually looking for here ?0likes0CommentsInfrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers
Can anyone help me with this question: Obtain a reverse Meterpreter session. What is the group ID of the current user? I have used the exploit exploit(windows/smb/psexec) to get the second token. But now I'm confused—don't I have to do a reverse shell? When I run this on the host, I'm the system user again. Lab: Infrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers0likes1Commentinsufficient permissions for the lab "IAM and EC2: Instance Profiles"
I am working on the lab "IAM and EC2: Instance Profiles" and in section 4 it requires launching an EC2 instance. The problem is that following all the steps, it returns the following error: Instance launch failed You are not authorized to perform this operation. User: arn:aws:iam::250176780079:user/aBCbsrMbk6Um5GQlxs7G is not authorized to perform: ec2:RunInstances on resource: arn:aws:ec2:us-east-1:250176780079:volume/* with an explicit deny in an identity-based policy. Encoded authorization failure message: ktHE_tnENT_yEI9xSX3pGA8Rv36ZXZirDZ_QIdV4cyWE9UtT_w-drjPxlGAyZIXfOUOKRgN42SjowCSdb5GLXvXfzYF0VLxOAtrmhyJcQOVwkXSuRrRVJ5-Bov1rX_uAt4E-VWR07oGDsl1LnJvKoNxgyVRV0fDUMgvzFcnskDDn_toD2yrFQeaQZLeVEA8dnk0IvNVtsXRp_KB3Mbc6kIkpbkCDzrAZMswqUI92w04__Hm2GATKTNr4Ok7ryj3fX9pqNmL4GxWxnamQitqaWyuQo45WD-4IMqu1OPVfxixHJ9OcDYFFWlFkc6w8-lXwwLzk5O5SvAhHbMPjM8JYpE9ECvZL1UDnTy8L39hOB8QS-p2YIayS4AbcUK4GXCzVqUrUYL5p5Jid9DrboEgXgMhgRg87YQX_H_4fiiGibLN_3N7-64hKyGPgKTsfXv1Yq7Zl-wJ0ckgo4QfQyxNNdb6iqRUm8WFtShWidZujtE3GdMXsqeSUKYsx2rDVEaX2qlFF7M6EDErOvhVa2Ify8X9VKkkgcEP6kkwiO-WLz7nHEnnNj8lCzNadkkc6tXsBWTerF6Q7kdO0lqczi3-c3nUSAH7q79GCX49IfvTHU6AOT59VWJCCKw7XjAYReMHXpeH9yUDQee6JlnAQ2qeuX09TTpC9LcZWMbgtr_cDd7rTJmhwdUTLkN3sSyzw0KuU3n9kgu0bHZWkm0P7X4y7E0mOXSZ2BGOni9OyEy_D8DYV9Y8f3JJ8XBT5_jzNInxSo0hogSginKSnH9xZUq_wuyxCPu1L2znbcM7KFrW1wkivq8OoGek Am I doing something wrong or is there actually a lack of permissions to complete it? Thank you very much for your help.Solved0likes4Commentspython-scripting-for-malware-analysis-ep-5-code-obfuscation
Has anyone attempted this lab? I appear to be stuck after creating a python script to put the code through the loops - I can produce a deobfuscated block but have inspected it using both xxd and strings but was unable to find a hidden url. Curious if anybody has solved it yet.Solved0likes13Comments
Get support from the community
If your question has been answered, help others by clicking: