Recent DiscussionsMost RecentMost LikesNo Replies YetNo Solutions YetSolutionsThreat Hunting Mining Behaviour - Question 1 Would it be possible to get some assistance with question # 1 of this lab (script responsible for the miner)? I went through just about all the .js file names and none were sufficient. Any hints? Help needed for Threat Hunting: Mining Behaviour Hey everyone! I need some help with this last question of a lab. I already identified the JSON authentication token and the packet that holds it. But within that packet, I just can't find the authent...SolvedHalloween 2020: Ep.1 – Death by Ink Hello, On the lab Halloween 2020: Ep.1 – Death by Ink - there is a target IP address - 10.102.81.69 but copying and pasting the IP address in Firefox doesn't load. I tried reverse DNS lookup and got...The Haunted Hollow: The Cursed Crypt Hello, I'm a little stuck on the Challenges & Scenarios section for the lab: The Haunted Hollow: The Cursed Crypt On one of the labs that fall into this category - The Cursed Crypt For questions ...S3: Access Policies (Q5) Hi I don't get passed this question when I put this for the access point: What am I missing here please, I always get an error on AWS saying that the access point can't be implemented. { "Vers...Sentinel Labs My team and I have been encountering a few peculiar issues with the Microsoft Azure Sentinel based labs (KQL, Sentinel Blue Team Ops, Sentinel SOAR, etc.) where correct answers do not appear to be ge...SolvedKubernetes: Native Logging In lab "Kubernetes: Native Logging" I really cannot understand the question - "What is the token for creating the correct audit rule as specified in the Tasks?" - in step 9. I configured auditing c...SolvedPractical Malware Analysis: .NET Encryption and Encoding I have completed all of the questions except decrypting the configuration string. I have the correct AES key (question 7 is correct - first 5 chars of the AES key) Although it seems that the instru...SolvedAPT29 Threat Hunting with Elasticsearch: Ep.11 – Demonstrate Your Skills Hello! I could rather easily get the answers for the other questions, but Q6 has really taken me aback. The question is: A PowerShell script was executed to assist with further enumeration. What co...Human Connection Challenge: Season 1 – Web Exploitation - XSS Question: Identify a reflected XSS vulnerability on the web application that reveals a token in the error message. There are a few forms on the web page: / -> submit reloads /, the attachment isn'...Solved
Tagshelp & support83defensive cyber41offensive cyber28application security23cloud security20cyber crisis simulations12feedback9cyber team simulations6other6candidate screening3