help & support
283 TopicsHelp with Snort Rules: Fake Tech Support Popup
I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000001; rev:1;) is the only snort rule giving me anything, but gives me 4 results, which is too many. I also tried adding the ports from said results to part 8, but none of those ports are the correct ports for the question. What do I do?Solved31Views0likes2CommentsNo files show up in the Microsoft Azure Basics: Function Apps lab
Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES inside it. I tried signing in to Azure extension from the Azure button in VSCodium and that got me the wokspacd but still nothing in the home http_queue folder. Does anyone else have this issue? Am I doing something wrong? Per the instructions there should be files in that folder See screenshots. Thank You.36Views0likes6CommentsGit Security: Git History
Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tried so many combinations that I’ve lost count. The most recent, which I don’t understand why it’s not working is: git log --diff-filter=A -- *.json To find the commits. git rebase -i <commit_hash> Then changing to edit in the text editor. git push origin --force To force push my changes. This is just one of many ways I’ve tried. Any help would be appreciated, it’s driving me a little mad haha. Thanks, JP22Views0likes1CommentCTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the answer Spearphishing Attachment, was not correct. I am wondering about where else I shoud be looking into as the main report mostly taked about email delivery methods in terms of initial access to credentials22Views0likes1CommentPowerShell Basics: Demonstrate Your Skills
Hi, I'm a little stumped on Q10 and was wondering if I could please get some help. I have used the Invoke-Command once script.ps1 was copied over from my local machine to Server 1 and established the text file. However how would I view the text file in question? I know the Get-Content command but as it's in a different directory it won't work. Many thanks.43Views0likes2CommentsAgents Skill-Building with Gemini CLI
Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some guidance or hint. The SKILL.md file has been created as the instructions and I have already tried to create it testing some workarounds but no success. ThanksSolved28Views0likes2CommentsIntroduction to Microsoft Sentinel - Error
Hi I've tried to open Introduction to MS Sentinel labs but always encounter " The lab has ended due to an error. Error Message: The lab has encountered a critical error.". Tried with different devices ( company/personal) , different browsers and WiFi connections but result remains same.16Views0likes1CommentIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?157Views0likes4Comments