Cyber Countdown: Day 1
Lab of the Day Every day we’re revisiting a standout lab from the past year—highlighting its impact and the skills it helped build, whilst also introducing you to the experts who built it. To get us started, today’s lab is of course Episode 2 of our Community Challenge -Scanning. In this lab we’ll test your scanning and enumeration skills but other than that, you’ll find limited information available to guide you. Lab author BethHolden, Cyber Security Engineer here at Immersive Labs is passionate about offensive cybersecurity and created this challenge as a little Christmas treat. The lab contains a range of tools which may provide multiple ways to solve the challenge, she’s eager to see how well you fare – good luck! As a reminder, we reward the top performing community members in the following categories: 🥇 First to Finish ⏱️ Fastest to Complete 🎯 Most Accurate 💪 Most Persistent 🎁 Spot Prizes In addition, at the end of each month, the lab author will provide a walkthrough to guide you through the lab and share hints, tips and expert advice on how to approach similar labs in the future. We also encourage you to submit your own walkthrough guides to community@immersivelabs.com and we will feature any unique approaches in their own Community Walkthrough Guide. You can read more about Season 1 of the Human Connection Challenge here. To be in with a chance of a prize you have until midnight on Sunday 22nd December 2024 to complete episode 2! To find the lab in the Immersive Labs Platform, Click Exercise > Challenges & Scenarios > The Human Connection Challenge: Season 1 > Scanning 🔔 Don’t miss out – there are 5 more labs to come in this challenge series. Make sure you're following the CHALLENGES Tag to get notified as soon as each one is released. Good Luck!864Views4likes25Comments🏁 Episode 6 of Season 1 of The Human Connection Challenge is Closed! 🏁
Hey everyone, We hope you had a blast tackling Lab 6 of The Human Connection Challenge: Season 1. With phrases like "tasty", "hardest one yet," and even "clueless" popping up in the discussions, it's no secret that the evil genuis StefanApostol had created quite the brain-bender! It's been fantastic to see the community collaborating and sharing your experiences, thanks to everyone who shared their hints and tips. Out of 274 attempts, a remarkable 14 of you successfully cracked the code - huge congratulations to those who conquered this challenge! Curious to know who the speediest and most persistent were? We'll be announcing the winners in our next monthly newsletter, coming out in May, so keep an eye on your inboxes 🔔 Don't rest on your laurels for too long, though! The next lab will be the SEASON FINALE and will be going live on 5th May. Make sure you're following the CHALLENGES Tag to get notified the moment it drops. You won't want to miss it288Views2likes14Commentskali linux: killall xfce4-panel
Hi @ all Maybe I am the only one that opens a root terminal on kali linux, pastes "killall xfce4-panel" to get rid of the menu bar at the bottom of the screen. For me it's a waste of screen space, esp. when running in a window. And if you ever wondered how to get rid of it, now you know. How do you deal with it? nc7Views0likes0CommentsThe Human Connection Challenge: Season 1 Episode 7 Is Now Live!
The 7th and final episode of Season 1 is here! Prove you skills in this Active Directory challenge! Welcome to the seventh instalment of the Human Connection Challenge: Season 1. This lab tests your ability to move around Active Directory and abuse its misconfigurations. As this is a challenge lab, you'll find limited information available to guide you. However, we've recently released the Introduction to Active Directory Attacks collection, where you can learn some of the most common AD attacks. This, combined with our already existing Kerberos collection, should give you all the tools necessary to complete this challenge. If you're new to the challenge, we reward the top-performing community members in the following categories with physical and digital challenge coins: 🥇 First to Finish ⏱️ Fastest to Complete 🎯 Most Accurate 💪 Most Persistent 🎁 Spot Prizes What's more, as this is the final episode of the season, we have some awesome prizes up for grabs if you complete one or more challenge lab before the 2nd June (Read more here). When the challenge ends, lab author StefanApostol will provide a walkthrough to guide you through the lab and share hints, tips and expert advice on how to approach this lab, so you can compare notes and learn techniques for the future. You're also very welcome to submit your own walkthrough guides to community@immersivelabs.com because we know that there are multiple methods you take to complete the challenge labs. We'll showcase any unique approaches taken. You can read more about Season 1 of the Human Connection Challenge here. To be in with a chance of a challenge coin you have until midnight on 23:59 BST on Sunday 1st June to complete episode 7! To find the lab in the Immersive Labs Platform, Click Exercise > Challenges & Scenarios > The Human Connection Challenge: Season 1 > Active Directory Good luck! 🤞93Views1like0CommentsModern Encryption: Demonstrate your skills
I am in the final lab of this collection and the step 3 I need to encrypt the file using aes 256 encryption using the following command and similar other commands I am using for setup 4 & 5 however the commands execute succesfully and a encrypted file is generated however a key file is not generated to decrypt the remaining for encrypted file to complete the lab. I need the help to solve this lab and get the badge. step 3- openssl enc -aes-256-cbc -a -pbkdf2 -nosalt -in plaintext_1.txt -out plaintext_1.enc step 4- Encrypt a file using RC4 openssl enc -rc4 -d -pbkdf2 -nosalt -in plaintext_2.txt -out plaintext_2.enc step 5- Encrypt a file using RC4 openssl enc --des-ede3-cbc -d -pbkdf2 -nosalt -in plaintext_3.txt -out plaintext_3.enc72Views1like5CommentsThe Human Connection Challenge: Season 1 Episode 6 Is Now Live!
Welcome to the sixth instalment of the Human Connection Challenge: Season 1. This lab tests your ability to analyze and exploit Thick Client applications. As this is a challenge lab, you'll find limited information available to guide you. Good luck! 🤞 If you're new to the challenge, we reward the top-performing community members in the following categories with physical and digital prizes, like our all-new challenge coin: 🥇 First to Finish ⏱️ Fastest to Complete 🎯 Most Accurate 💪 Most Persistent 🎁 Spot Prizes When the challenge ends, lab author StefanApostol will provide a walkthrough to guide you through the lab and share hints, tips and expert advice on how to approach this lab, so you can compare notes and learn techniques for the future. You're also very welcome to submit your own walkthrough guides to community@immersivelabs.com because we know that there are multiple methods you take to complete the challenge labs. We'll showcase any unique approaches taken. You can read more about Season 1 of the Human Connection Challenge here. To be in with a chance of a prize you have until midnight on Sunday 20th April to complete episode 6! To find the lab in the Immersive Labs Platform, Click Exercise > Challenges & Scenarios > The Human Connection Challenge: Season 1 > Thick Client 🔔 There are 7 labs within this series so make sure you're following the CHALLENGES Tag to get notified as soon as the final lab is released! Now it's time to take on that challenge! Let us know how you got on in the comments below!364Views0likes24CommentsWhat do you prioritise during team cyber attack simulations?
Are you responsible for creating and/or assigning cyber attack simulations to teams within your organisation? 🚨 These planned and facilitated exercise are designed to test and evaluate an organisation's preparedness and response capabilities in the event of a cyber incident, and we are looking to understand how you prioritise aspects of these team events. Please share your expertise with us by answering 2 questions about what is most important to you when planning and running these exercises. Your feedback will help to shape future Immersive products. https://www.surveymonkey.com/r/drills-priorities Thank you!18Views1like0CommentsAPT29 Threat Hunting with Splunk: Ep.11 – Demonstrate Your Skills - Question to Q9
Hello everyone I can't find the solution to question 9 (How many file types were exfiltrated at this stage?) in APT29 Threat Hunting with Splunk: Ep.11 - Demonstrate Your Skills. I thought it was the files that are in the log of EventId 4103 Search: EventCode=4103 Get-Item C:\Users\Administrator.BARTERTOWNGROUP\Links\Downloads.lnk C:\Users\Administrator.BARTERTOWNGROUP\Favourites\Bing.url ..... Can anyone help me?Solved100Views1like3Comments