Recent DiscussionsMost RecentMost LikesNo Replies YetNo Solutions YetSolutionsCybersecurity and philosophy Fellow members of the Cyber family: I think the ancient philosophers, those who recognized their own ignorance, were motive: their curiosity to learn, to question, to go a step further, to not settl...I have completed several labs in a collection, but my progress still shows as 0% Can this be anything to with labs being "development labs"? SolvedMalicious Document Analysis: Dropper Analysis I have completed up to question 6 on here and I can not get the python script to work. I have gone through and "fixed" the required portions but keep getting "modulenotfound: no module named 'oletool...SolvedHelp needed for Threat Hunting - Credential Access Hey! I'm not sure if this is the right place to seek help for labs but I've been trying this lab for the longest of time and could not get the answer for this question. OfficeSupplies.7z felt the mos...SolvedCVE-2022-29799/CVE-2022-29800 (Nimbuspwn) – Defensive Hello community, I can't find the answer to these question I tried using the Sigma file provided in the lab to query Splunk it returned no events. I also tried doing custom queries with using si...Introduction to OWASP ZAP I'm completely stuck with this one I can see in the robots.txt that there's a disallow page as /checkout but it seems that this page doesn't exists.. What i'm missing? any hint? SolvedReturn to Haunted Hollow: Haunted Helpdesk Hello everyone, I'm stuck in Q2 of Return to Haunted Hollow (escalate to root). Does anyone have any hint about what binary or service can be exploited to elevate privileges? Kind regards, SolvedRe: Cross-Site Scripting: Ep.6 – Further Exploitation I'm also stuck and cannot get the script to display the admin/token page. I'm using the script from the XSS and SSRF section. From that script I changed line 2 the I changed the open to use /admin...OWASP 2017 Java: Underprotected APIs I am stuck on the "OWASP 2017 Java: Underprotected APIs" challenge. I have tried accessing "<Target URL>/FileDownloadServlet?path=/etc/&file=flag.txt," for which I received the error message "HACKI...SolvedReverse Engineering RE: Immersive Care: Ep.5 – Reverse Engineering Feel like I'm missing something obvious here. I have decompiled the ransomware and can see the xorIT command, but not sure how to find the secret ke...Solved
Tagshelp & support62defensive cyber36offensive cyber25application security24cloud security15cyber crisis simulations12feedback7cyber team simulations6other5workforce exercising2