Forum Widgets
Recent Discussions
IoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?Credential Access: Password Hashing Algorithms
Hi, I'm stuck on Question 10 for this lab: Using the HashID tool, what is the hashing algorithm for the hash $racf$*IMMERSIVE*5AA70358A9C369E0? HashID returns 'unknown hash' and the best I can find by cracking it in other tools is 'Half MD5' which is coming up as incorrect. Am I missing something for this one please? Thank you :)SolvedTrick or Treat on Specter Street: Ghost of the SOC
Hi there, Am I right as obvious that it may seem that for me to login to Kibana, I need to access this through the Elastic IP address that I have entered in my browser? If so I'm getting the error message on my screenshot. I tried this a few days ago as well and the problem persisted then as well.0likes15CommentsTrick or Treat on Specter Street: Phantom Pages
Hey everyone! 👋 I've been working through Trick or Treat and having a blast so far. However, I've hit a wall on Question #3 of Phantom Pages and could use some help! What I've tried: Found the library and answer to #2 Examined all the book titles Identified 3 titles that have numbers at the end Reviewed the available hints I have these books with the numbers (horror, swamp and mask) but I'm not sure how to combine or use anything to create the 9 digits authorization code. Am I missing a pattern? Should I be looking at something else? Any hints or help would be greatly appreciated! Thanks in advance!Solved0likes4CommentsWindows Sysinternals: ProcDump
Hi there, I'm a little stuck on Q9 and would greatly appreciate some help :-) I'm practically at the last stage, but stuck as to what sekurlsa module to use to analyse my .dmp file, to which I then know that I need to then enter the module sekurlsa:logonpasswords, but the step before that is getting me a little confused.Solved0likes3CommentsTrick or Treat on Specter Street: Serpent Sanctum
So for this challenge we have got hint: (serpent-statue) $ hint Maybe the fang can be in two places at once... Tried to copy both fang.key and fang2.key to statue folder but it did not allow me. The error message: The statue's eyes flare red with anger. This is merely a copy; a false fang with no power. The worthless copy crumbles to dust in your hands. What other methods can we try here? Anyone solved it already?Solved
Get support from the community