help & support
47 TopicsCVE-2022-33891 (Apache Spark) – Defensive Question 8
I am wondering about what I am missing in terms of: Analyze the log files. At what time does the attacker first discover that the Apache Spark engine is accessible? (Provide your answer in the format HH:MM:SS) I cant seem to get the time right. unless if I am looking at the wrong area.2Views0likes0Commentshelp with A Christmas Catastrophe: A Letter to Santa
I am in the scalation privileges part. Tried to create a symlink to /root/root.txt and to /root in /etc/letters/ waiting cron /etc/chmod.sh takes ownership with chmod 666 instruction and then extract token, but doesn't work Any help? Is there something missing?141Views0likes5CommentsCredential Access - NTDS
Got down to the last two questions and I felt like I've tried all suggestions in the briefing. Can anyone help out with the last two question? Also, the "secretsdump.py -ntds <ntds.dit path> -system <SYSTEM hive path> LOCAL" isn't working but tried "impacket.examples.secretsdump" and it doesn't throw an error, but also doesn't throw any output.198Views1like3CommentsYellow Banner You are not licensed to view this lab
I am writing to report a persistent issue I've encountered when trying to access the labs on your platform. Since I started using the platform, I consistently receive the message "You are not licensed to view this lab" (highlighted in yellow), and this applies to all labs I attempt to access, not just a specific one. Could you please provide information on the necessary steps to obtain the required license for accessing these labs, or if there is any technical issue with my account? Thank you for your assistance in resolving this matter. Sincerely,123Views1like1CommentNeed help in the lab - APT29 Threat Hunting with Splunk: Ep.11 – Demonstrate Your Skills
I am currently working through the APT29 Threat Hunting with Splunk: Ep.11 – Demonstrate Your Skills lab and would appreciate your assistance in reviewing or clarifying a few specific questions. Despite thorough log analysis and validation via Splunk queries, the following questions are not accepting what I believe to be correct answers: Q10. A PowerShell script was initially executed to extract encoded data from an image file. What is the full ParentCommandLine field value used to execute this? Q11. This PowerShell script was added to a registry key that was used to bypass user access control. What other value was set on the same key to facilitate this? Q15. what was the name of the service created to obtain a means of persistence? Q23. What is the name of the executable that's executed by the persistence mechanism placed in the Windows Startup folder?224Views2likes2Comments