Forum Widgets
Recent Discussions
Hack Your First PLC: Ep.3 – Discovering PLCs Using Wireshark
Task/Question In 6: How many coils are being read as part of the communication between 172.21.1.10 and the other device? I would use the following filter: "ip.src == 172.21.1.10 && ip.dst ==172.21.1.20 && tcp.port == 502 && modbus.func_code == 1" but no idea how to get the "quantity of coils". It seems not to be the numbers of packets from the applied filter. Regards.0likes0CommentsCVE-2021-25281 (SaltStack) – Offensive
Need tips to get going with this, information on the exploit is sparse. I have the port, just need some help creating the correct command line. Not much out there on the internet on this. I have tried variations on commands like this: python3 poc.py http://10.102.178.147:8000 state whoami python3 poc.py http://10.102.178.147:8000 ssh id_rsa.pub (after generating the keys with "ssh-keygen -t rsa")0likes3CommentsCVE-2022-30190 (Follina) ms-msdt Scheme Abuse – Offensive Question 11
Hey guys, wondering if when trying to upload the payload for "Question 11: In a browser, visit http://<TARGET_IP>:8080, upload the payload.docx file, then press Submit and Execute" if this error is supposed to be generated. After choosing the file after clicking browse sometimes this work. After executing nothing seems to happen though. even after 30 seconds of waiting.CVE-2022-26134 (Confluence) – OGNL Injection
For Question 6. Look at the first exploit attempt by this attacker. What command did they run? I am wondering about why when sharing the commands found in the logs, it still outputs wrong. even if typing in "X-Cmd-Response" as the command as well as the entire string found. Wondering if they are exepecting a different format/snippet of the code, or the GET requests instead?Terrapoint (Hats off, Immersive Labs)
Small clues about the labs I consider most important, after solving all of them: Norway and Rwanda; but this is just the beginning of your journey :). Because for the others in the collection, I want to think that you are capable of looking up a phone number: right? ;). The most evil labs, Norwegians and Rwandans ones (in my opinion): In both cases, you must make the most of every pixel in the image provided: such as signs, symbols, and landmarks; once you have done so, try to find out where you really are!. And that's how I won them over: study where that road begins and ends... and simply let yourself be carried away by it, kilometer by kilometer. Tip: don't trust primary sources, they are wrong!: for example, on the main roads of that African country.0likes0CommentsICS Malware: Triton ModuleNotFoundError: No module named 'pefile
when running this command: python3 python_exe_unpack.py -i /home/iml-user/Desktop/Lab-Files/trilog.exe -o /home/iml-user/Desktop/Lab-Files Traceback (most recent call last): File "python_exe_unpack.py", line 14, in <module> import pefile ModuleNotFoundError: No module named 'pefile' Tried pip3 install pefile but failed. Please advise.0likes3Comments