Recent DiscussionsMost RecentMost LikesNo Replies YetNo Solutions YetSolutionsA Letter to Santa Hello everyone, Wrong time of year, I know.. I've been having a go at the Christmas challenge collection and stuck on "A letter to Santa". I've managed to get code execution as user but strugglin...Hack Your First Web App: Ep.6 - Hydra I am stuck on Question 7 which instructs you to use hydra to brute force a password. I was able to use it correctly on Ep. 5. I have tried using the same cmd and changing to the login page but it...GuardDuty: Demonstrate Your Skills Has anyone had any issues with the GuardDuty lab. GuardDuty: Demonstrate Your Skills - Labs - Immersive In task no.4 It asked you: In order to encrypt findings being exported to S3, GuardDuty requi...Infrastructure Hacking: Responder Network Poisoning Two questions giving headache: 1. What is the database containing captured hashes called? i put all the RDBMS and NOSQL names, no gain 2. What name does Responder.py not respond to by default? ...Solvedcopy-paste-compromise-malicious-documents-analysis Hi, I am stuck in the question 10. stage_2 contains a reference to a file – Library.pdb. What is the full path to this file? Can anyone help me with this? Snort Rules: Ep.9 – Exploit Kits I am pulling my hair with question number 8 Create a Snort rule to detect the third GET request in the second PCAP file, then submit the token. This one should do it but it is not working. alert t...CSP Hash Incorrect Despite Correct Script and Hash (CSP Lab Issue?) Hello all! I'm working on Introduction to Content Security Policy (CSP) Lab: Content Security Policy: Hashes exercise that requires generating the correct hash for an inline script like: <script>d...Threat Research: Dependency Confusion Lab Hello Community, I am almost finished Threat Research: Dependency Confusion Lab, but I am stuck with the last question "What is the token found in /root/token.txt on the target server?". I have fo...Foundational Static Analysis: API Analysis step 10 Step 10 of this lab says to go to the command line and run xelfviewer. In my virtual machine, that is not found. I see a directory for the building of it, but I don't find the binary anywhere to be a...Brute Ratel: Extracting Indicators of Compromise Hi Team, Please assist me with "Brute Ratel: Extracting Indicators of Compromise" Lab, I am stuck with Q. 4 and 7. Thank you!
Tagshelp & support144defensive cyber79immersive labs51offensive cyber43cloud security37application security32cyber crisis simulations15challenges15questions & feedback14feedback12