Credential Access - NTDS
Got down to the last two questions and I felt like I've tried all suggestions in the briefing. Can anyone help out with the last two question? Also, the "secretsdump.py -ntds <ntds.dit path> -system <SYSTEM hive path> LOCAL" isn't working but tried "impacket.examples.secretsdump" and it doesn't throw an error, but also doesn't throw any output.2Views0likes0Comments๐ข We want to hear from you!
Our community is growing and your feedback is invaluable in helping us grow and improve. Please take a few moments to share your thoughts, experiences and suggestions with us. This survey should take no more than 5 minutes to complete, and please be assured that your responses will be kept confidential and used only for the purposes of this survey. We understand that your time is valuable, and we're grateful for your willingness to help us improve.15Views1like0CommentsThank you, Immersive Labs
For your kindness and genius. And for allowing us to be a little bit wiser every day; thank you for your practical and theoretical labs (I have even smiled with some of them :)). Thank you for making us investigate, for going a little further; and for having an impact on our customers: protecting them better. Thank you for allowing us to work with recent CVEs from various perspectives (attack, defense and post-mortem). Thank you for your effort and for making it possible. Here's to many more years! :).63Views5likes1CommentOperation Kobold - Defensive SOC Track 2
I need help with these two questions could you please guide me Continuing your analysis of the file identified in Question 29, what is the address of the C2 Server? What is the value of the watermark found in the executable identified in Question 29?45Views1like2CommentsCVE-2024-3094 (XZ Utils Supply Chain Backdoor)
This training was a deep dive into supply chain attacks, focusing on how attackers compromise third-party libraries to infiltrate systems. ๐ณ ROOT: The Core Lesson ๐น Your code is only as secure as its weakest dependency. ๐น Attackers donโt always target your appโthey infect the libraries and tools you trust. ๐น A single update from upstream can spread malware downstream into thousands of systems. ๐ฒ BRANCHES: Key Takeaways 1๏ธโฃ Trunk: The Major Incidents (Real-World Cases) ๐ Log4j (CVE-2021-44228) โ A simple logging library led to RCE attacks on millions of apps. ๐ XZ Utils Backdoor (CVE-2024-3094) โ Attackers planted a hidden SSH backdoor inside a widely used Linux tool. ๐ SolarWinds Attack โ A trusted software update infected top enterprises & governments. 2๏ธโฃ Branches: How These Attacks Work? ๐ฟ Compromised Upstream โ Hackers inject malicious code into open-source projects. ๐ฟ Silent Propagation โ CI/CD pipelines & OS distros auto-fetch infected updates. ๐ฟ Exploitation in Production โ The attacker gains remote access, RCE, or data leaks. 3๏ธโฃ Leaves: Defensive Actions You Must Take! ๐ Pin Dependencies โ Use fixed versions instead of "latest". ๐ Verify Integrity โ Check hashes, signatures, and changelogs before updating. ๐ Scan Your Stack โ Use SCA tools like Dependabot, Trivy, or Snyk. ๐ Restrict CI/CD Auto-Updates โ Require manual reviews for third-party updates. ๐ Monitor for Compromise โ Set alerts for vulnerable dependencies. ๐ TOP OF THE TREE: The Final Takeaway Supply chain security is not an optionโit's a necessity! If upstream is compromised, everything downstream is at risk. Never blindly trust software updatesโalways verify before deploying. Your security is only as strong as the weakest library you import! Be proactive, not reactiveโbecause the next Log4j or XZ Backdoor could already be in your pipeline!34Views1like0CommentsQuestion for members: your most rebellious labs
Hello!, I think it would be interesting to share in this Community those labs that have been the most difficult for us to complete; or those that are resisting us and we have invested a significant amount of time: trying tactics and techniques, reading carefully their documentation and references, blog posts about the exploits, testing options or just going step by step. Let's get started :)!: .: I find it hard to finish labs related to access policies or permissions in Cloud: maybe it's the syntax required to give permission to a S3 bucket or to the access point ... but I invest a lot of time to complete them. I am close to having finished 2,400 labs but when I have to write the concrete policy in that json file I struggle :). .: Esoteric labs, as I like to call them ^^. Example: CAN bus. Don't ask me the specific reason, but I have been trying for some time to finish the last few!: I love them, but I'm stuck at the moment. [...] So: which are the labs you have had the hardest time finishing (no matter the difficulty) and which are the ones you are investing the most time in?. Thank you and good luck!.94Views1like2CommentsWinDbg: Ep.3 โ Debugging Malware
The briefing says: [...] bp kernel32!LoadLibraryA ".printf \"Loading Library: %ma\",poi(esp+0x4);.echo};g"bp kernel32!GetProcAddress ".printf \"\t Looking up function: %ma\",poi(esp+0x8);.echo;g"bp advapi32!CreateServiceW ".printf \"Creating Service: \";.echo;.printf \"\tService Name: %mu\",poi(esp+0x4);.echo;.printf \"\tDisplay Name: %mu\",poi(esp+0x8);.echo;g" [...] Yet, none of these work. The OS was updated, the instructions not. Fix: bp KernelBase!LoadLibraryA bp KernelBase!GetProcAddress bp sechost!CreateServiceWSolved125Views1like1CommentRemove the panel on Linux?
On most Linux systems (except for e.g. Kali Linux) there's a panel at the bottom. The first thing I do usually: killall xfce4-panel Maybe it's better with larger screens, but on laptop screens that panel is really a waste of screen space. How's about removing it?Solved46Views0likes1CommentOpen Source Intelligence (OSINT): Boarding Pass
Has anyone else had issues with this entire OSINT lab? In the Social Media lab, I had to create a throwaway X account just to be able to find the content on the Dade Murphy profile. Perhaps this lab should be updated to reflect the way X operates now, with limits on what can and can't be viewed without logging into an account. I'm now on the Boarding Pass lab, where I have to continue the OSINT research into Dade's Facebook profile. I'm having significant issues with The Wayback Machine, as it only allows me to access 1 of the 16 captures showing. However, I can't view anything on this 1 accessible profile as I am not logged in, yet I cannot log in through The Wayback Machine. The lab requires me to find and view an image of a boarding pass he has apparently uploaded, to do some OSINT research on the data within it, but I can't view any images at all! It seems like this lab isn't possible at the moment for me. Does anyone have any tips on this? ThanksSolved73Views0likes4Comments