Recent DiscussionsMost RecentMost LikesNo Replies YetNo Solutions YetSolutionsMalicious Document Analysis: Dropper Analysis Hello, I am having an issue running the script for this lab. When I try to it says that there are no "oletools" module found. Does anyone know how to fix this or is there a problem with my script? D...Reverse Engineering (Offensive) JavaScript Analysis: JSDetox I'm stuck at below two questions Q6: Which variable does the initial script try to return? Q8: The exploit kit contains a large block of hex encoded shellcode stored in a variable. This shellcode...SolvedCandidate screening assessments Can you please provide guidance on how a user should navigate to a Candidate Screening Assessment? Node.js - Beginner -- What am I missing? In the Node.js - Beginner collection there is a practical lab on Forced Browsing. I have completed what is setup as the criteria for the lab but it keeps telling me that the code isn't secure. I h...Foundational Static Analysis: Analyzing Structures The question is asking me "In the disassembly at address 00401567, what is the structure EDX is pointing to? Look at Microsoft Docs for help!" At the very end of the briefing they go over the explan...dotCMS Remote Code Execution (CVE-2022-26352) Hi all, I completed all steps and got RCE, I thought I found the password but lab says its not valid. Please check the screenshots. Is it a lab error or..? Thanks in advance SolvedWinDbg: Ep.3 – Debugging Malware The briefing says: [...] bp kernel32!LoadLibraryA ".printf \"Loading Library: %ma\",poi(esp+0x4);.echo};g"bp kernel32!GetProcAddress ".printf \"\t Looking up function: %ma\",poi(esp+0x8);.echo;g"bp...WinDbg: Ep.5 – Kernel Internals Question 9:Looking at the system process and the !token command, what is the User field? What I did: [...] lkd> !process 0 0 **** NT ACTIVE PROCESS DUMP **** PROCESS ffffdf0609685200 SessionI...WinDbg: Ep.4 – Debugging a Windows Crash Hi Q7:Identify the invalid reference to a memory address that causes the crash. instead of instructions, what characters are shown at this location? It seems I have issues understanding the questi...Introduction to OWASP ZAP I'm completely stuck with this one I can see in the robots.txt that there's a disallow page as /checkout but it seems that this page doesn't exists.. What i'm missing? any hint? Solved
Tagshelp & support60defensive cyber34offensive cyber25application security24cloud security15cyber crisis simulations12feedback7cyber team simulations6other5workforce exercising2