help & support
159 TopicsEp 7 Post Exploitation With Metasploit
I’m having issues with q9 and don’t know why what I’m currently doing isn’t working. I’ve ran SharpUp.exe and found a vulnerable binary location (C:/Windows/Important-Service/Important-Service.exe). From my original meterpreter session, I have uploaded a new msfvenom payload called Important-Service.exe to the location above, with hope to spawn a new shell on another listener. Nothing is happening when I start the service or execute the exe. Any pointers with this one? I feel that what I am doing is correct and should work.44Views0likes4CommentsActive Directory Basics: Demonstrate Your Skills
Hello, I'm a little confused as to Q10 of this lab and sincerely hope I wasn't the only one until somebody figured it out? As with the question, I have gone into Server Manager and followed the instructions by adding COMP-HYDRA to the domain but getting the error message below? Any help would be greatly appreciated!4Views0likes0CommentsCredential Access: Using Hydra
Hi team, I was wondering whether anyone can please help me, as I'm stuck on Q10. So the part I'm stuck on is trying to figure out how to put a command together to use - unix_users.txt and rockyou.txt to brute force an account that can log onto the web application for port 8000 Any suggestions are more than welcome! Many thanks.65Views0likes9CommentsModern Encryption: Demonstrate Your Skills
Hello, I am a little stuck on Q3 for this lab and would really appreciate any help I can get. So I have followed the steps as required by encrypting the file - plaintext_1.txt and set the password as per steps on the actual file itself - plaintext_1.txt. However after setting the password I am not getting token_1.txt appearing in the Lab-Files folder. What am I doing incorrectly?97Views0likes8CommentsPwntools: Ep. 2 Token
I've completed the coding for the lab, but the system seems to think the token I am entering is wrong. I've tried resetting the machine in case it is out of sync since a new token is generated each time the code is run, but that didn't fix it. Can someone help?17Views0likes1CommentIncident Response Suspicious Email Part 2 last Question
Hello I am getting slowly crazy here. The last question of Suspicious Email Part 2 asks to find the FQDN of the threat actor within the output that in the previous questions we had to deobfuscate after unpacking the vbaProject.bin using Oletools and / or a script. I created a script to convert Decimal to ASCII and the Hash in the end was matching and I solved the 2nd to last question. However afterwards it says the FQDN should be in the file I just created. This is not the case. I checked the file with strings and even read the whole file line by line to find any FQDN. The only sites in there are apache and zeustech which are only in there because ApacheBench got used in the Malware. There is no trace of any further FQDN. So I'm effectively stuck there because I can't find any worthwhile Info. Does anyone have any Idea? Or is this Lab just broken? I redid the whole Lab from scratch 2 times already. Both times I wrote a new Script aswell and everytime the Hash is correct but there is no FQDN to be found anywhere in there.30Views0likes1CommentIncident Response: Suspicious Email – Part 2 -Help Needed.
Hi, I'm currently trying to complete this lab but I'm stuck on step 10. I have tried to use the different tools at hand but I'm struggling to extract the VBA and getting the binaries for it. Any help would be much appreciated. Kind Regards, jjdeno9926Views0likes3CommentsAdvanced CTF Challenge: Hardened Maze
Hi Team, I found file upload options on one port but get information: "For authorized personnel: Upload a critical security patch." I tried with many extension with curl and POST method with -F "exe_file=@filename" Unfortunately, it does not accept any of my combinations. You can give us some clue as to how to approach this 🙂Solved206Views1like9CommentsFree Tier: Limits on Number of Environments (AWS quotas vs Snap Labs limits)?
Hello immersive community, I’m on the free version of Snap Labs and understand the 4 VPN profiles per environment restriction. My question is about environment limits: Is there a Snap Labs–imposed limit on the number of environments I can create/launch under one account? Since Snap Labs ties into my AWS account, should I assume that AWS service quotas (like EC2 vCPUs, VPCs, or Elastic IPs) are the real limiting factor? Just trying to plan ahead so I don’t accidentally hit a ceiling when launching multiple labs. Thanks for clarifying!Solved26Views0likes3Comments