Featured Discussions
Welcome to our new Community, we are so happy that you have joined us and we'd love to get to know you all. Please introduce yourself in this thread by telling us a little bit about yourself and your...
133Comments
Do you have what it takes to escape The Maze?
Put your offensive security skills to the ultimate test in eight of the most challenging OffSec labs ever assembled by the Immersive team.
Whether y...
2Comments
What was the first level 9 lab you conquered? :). It does not matter that you will seek advice from other giants, or that you will manage to complete it on your own: share your journey with us!; to ...
10Comments
Forum Widgets
Recent Discussions
Server-Side Request Forgery Web App Hacking
I've been banging my head against this for a few hours now and worked my way all the way through to step 7. I am not able to retrieve /tmp/token.txt. I've tried modifying the "url" param key and found it throws a 500 for anything I've tried other than "url". I've tried modifying the "url" value to use directory traversal and "///tmp/token.txt", "/tmp/token.txt". Still no luck. I've also tried using the original url paths and the bypass I used to view the config file for the bot and I get 404's back. I think the lab could have an issue? I have screenshots but didn't want to share them unless asked to not reveal any answers. Any help is appreciated.0likes1CommentImmersive lab Ghidra, Ep2.
In This lab I have answered all of the questions except question 4 - "Using the function graph on the main function, what is the starting address of the last basic block?" It is not clear which block the "last" one is. I have entered the starting address of all basic blocks but none are correct. Is there some secret to this question that I haven't discovered yet?1like3CommentsWelcome to all our new members!
A warm welcome to ReubenK jdavila cwoolley mduzgun Dimitry La_Pulga1711 Adriansito CyberAAA AbdullahBaomar N8mann ksultan Don't forget to introduce yourself to the community, and if you are up for a tough challenge to discuss with other members, have a go at our recently launched maze challenge! We've just uploaded a Labs Live recording of the first Maze lab, where you can get tips, hints, and answers for the challenge series.1like1CommentNew Maze Challenge is now LIVE!
Do you have what it takes to escape The Maze? Put your offensive security skills to the ultimate test in eight of the most challenging OffSec labs ever assembled by the Immersive team. Whether you’re an experienced Red Teamer, or fancy yourself an offensive security superstar, this one’s for you! Check out the new Community Challenges Area today to find out more about The Maze and how to take part: Maze2likes2CommentsWeekly welcome
Welcome to our newest community members, ChaosDuck26 Nada Sherlock120192 securitynavigator pcarra1 Shahinaz Leanhaz1 domel44 Samh051 NIETOM fernie Where to go from here? Introduce yourself to the community, and if up for a tough challenge to discuss with other members, have a go at our recently launched maze challenge! We've just uploaded a Labs Live recording of the first Maze lab, where you can get tips, hints, and answers for the challenge series.2likes1CommentHacking tools
Just (re)entering the space of hacking hardware (I had a flipper, but it went boom after a fallout with a bottle of Coke and the rubbish attached lids we have in the UK. I am getting the stuff to build a Bjorn networking tool as a first project. In a "Oh-I-wonder-if-I-could build-one-educational" activity... Has anyone built one before? What use did you get out of it? What other tools have people built?Take part in Immersive research: AI Chatbot in labs
📢 We would love to hear your opinions on a new AI Chatbot concept within our labs. Can you spare an hour to come along to a research call? During the call, you will be asked to undertake a lab on our test environment, using the AI chatbot to assist. We will then ask for feedback on your experience. You will need to attend the call on a laptop or desktop (no tablets or phones) and be able to share your screen throughout. The session will be recorded and will take place using Google Meet. Upon completion of the session, you will receive a £50 eGift card (or local currency equivalent). Sessions are taking place August 12-14th. 🗓️ Sign up at a time that is convenient for you, using this booking form..