Forum Widgets
Recent Discussions
Microsoft Foundry Guardrails: Jailbreak Protection issue with http://metroliochat.com
Hello, I started the Microsoft Foundry Guardrails series and got through creating a filter. The next step is to switch to the http://metroliochat.com tab and enter some prompts. However, that url is throwing an error of Access Denied. Is that an issue with the startup of the VM? I did exit and restart the lab but still have Access Denied when attempting to load that page. Can someone check on that part of the lab?Solved0likes4CommentsHelp with Snort Rules: Fake Tech Support Popup
I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000001; rev:1;) is the only snort rule giving me anything, but gives me 4 results, which is too many. I also tried adding the ports from said results to part 8, but none of those ports are the correct ports for the question. What do I do?SolvedAgents Skill-Building with Gemini CLI
Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some guidance or hint. The SKILL.md file has been created as the instructions and I have already tried to create it testing some workarounds but no success. ThanksSolved0likes2CommentsSOC Analyst – Advanced / Malware Analysis / CookieMiner
The task 6 says "Use strings to recover a Base64 string from the memory image and decode it." The output of strings vs memory image produces a file with about 4M strings, typical grep for base64 "compatibility" reduces the size but not drastically. Is there a chance to get a hint on how to proceed?Solved0likes3CommentsInfrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers
Can anyone help me with this question: Obtain a reverse Meterpreter session. What is the group ID of the current user? I have used the exploit exploit(windows/smb/psexec) to get the second token. But now I'm confused—don't I have to do a reverse shell? When I run this on the host, I'm the system user again. Lab: Infrastructure Hacking: Demonstrate Your Skills – Attacking Web ServersSolved0likes2CommentsNetwork Hardening Lab Recommendations
I've been looking for some good training resources for network hardening. I've been working through the Windows Hardening collection and found it really useful. Are there any other lab recommendations similar to this? In particular hardening things such as PfSense firewalls, Vyos routers, Linux endpoints etc.Solved
Get support from the community
If your question has been answered, help others by clicking: