help & support
223 TopicsCTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the answer Spearphishing Attachment, was not correct. I am wondering about where else I shoud be looking into as the main report mostly taked about email delivery methods in terms of initial access to credentials3Views0likes0CommentsPowerShell Basics: Demonstrate Your Skills
Hi, I'm a little stumped on Q10 and was wondering if I could please get some help. I have used the Invoke-Command once script.ps1 was copied over from my local machine to Server 1 and established the text file. However how would I view the text file in question? I know the Get-Content command but as it's in a different directory it won't work. Many thanks.28Views0likes2CommentsAgents Skill-Building with Gemini CLI
Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some guidance or hint. The SKILL.md file has been created as the instructions and I have already tried to create it testing some workarounds but no success. ThanksSolved13Views0likes2CommentsIntroduction to Microsoft Sentinel - Error
Hi I've tried to open Introduction to MS Sentinel labs but always encounter " The lab has ended due to an error. Error Message: The lab has encountered a critical error.". Tried with different devices ( company/personal) , different browsers and WiFi connections but result remains same.11Views0likes1CommentIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?138Views0likes4CommentsElastic Data Ingest: Demonstrate Your Skills Q9
I have found the answers to all the other questions including 10 but I don't quite understand what Q9 is asking for when it says "Shortly after this file was created, two temp files were also created. What is the last 6 characters in the name of these temp files?" . I have found the files created after q8 answer see below but as far as I can see no combination of the perfstringbackup.tmp file is being accepted (have tried including the file extension and not) . Any guidance on what the question is actually looking for here ?21Views0likes1Commentinsufficient permissions for the lab "IAM and EC2: Instance Profiles"
I am working on the lab "IAM and EC2: Instance Profiles" and in section 4 it requires launching an EC2 instance. The problem is that following all the steps, it returns the following error: Instance launch failed You are not authorized to perform this operation. User: arn:aws:iam::250176780079:user/aBCbsrMbk6Um5GQlxs7G is not authorized to perform: ec2:RunInstances on resource: arn:aws:ec2:us-east-1:250176780079:volume/* with an explicit deny in an identity-based policy. Encoded authorization failure message: ktHE_tnENT_yEI9xSX3pGA8Rv36ZXZirDZ_QIdV4cyWE9UtT_w-drjPxlGAyZIXfOUOKRgN42SjowCSdb5GLXvXfzYF0VLxOAtrmhyJcQOVwkXSuRrRVJ5-Bov1rX_uAt4E-VWR07oGDsl1LnJvKoNxgyVRV0fDUMgvzFcnskDDn_toD2yrFQeaQZLeVEA8dnk0IvNVtsXRp_KB3Mbc6kIkpbkCDzrAZMswqUI92w04__Hm2GATKTNr4Ok7ryj3fX9pqNmL4GxWxnamQitqaWyuQo45WD-4IMqu1OPVfxixHJ9OcDYFFWlFkc6w8-lXwwLzk5O5SvAhHbMPjM8JYpE9ECvZL1UDnTy8L39hOB8QS-p2YIayS4AbcUK4GXCzVqUrUYL5p5Jid9DrboEgXgMhgRg87YQX_H_4fiiGibLN_3N7-64hKyGPgKTsfXv1Yq7Zl-wJ0ckgo4QfQyxNNdb6iqRUm8WFtShWidZujtE3GdMXsqeSUKYsx2rDVEaX2qlFF7M6EDErOvhVa2Ify8X9VKkkgcEP6kkwiO-WLz7nHEnnNj8lCzNadkkc6tXsBWTerF6Q7kdO0lqczi3-c3nUSAH7q79GCX49IfvTHU6AOT59VWJCCKw7XjAYReMHXpeH9yUDQee6JlnAQ2qeuX09TTpC9LcZWMbgtr_cDd7rTJmhwdUTLkN3sSyzw0KuU3n9kgu0bHZWkm0P7X4y7E0mOXSZ2BGOni9OyEy_D8DYV9Y8f3JJ8XBT5_jzNInxSo0hogSginKSnH9xZUq_wuyxCPu1L2znbcM7KFrW1wkivq8OoGek Am I doing something wrong or is there actually a lack of permissions to complete it? Thank you very much for your help.Solved76Views0likes4CommentsModern Encryption: Demonstrate Your Skills
Hello, I am a little stuck on Q3 for this lab and would really appreciate any help I can get. So I have followed the steps as required by encrypting the file - plaintext_1.txt and set the password as per steps on the actual file itself - plaintext_1.txt. However after setting the password I am not getting token_1.txt appearing in the Lab-Files folder. What am I doing incorrectly?Solved431Views0likes14Comments