immersive labs
130 TopicsSOC Analyst – Advanced / Malware Analysis / CookieMiner
The task 6 says "Use strings to recover a Base64 string from the memory image and decode it." The output of strings vs memory image produces a file with about 4M strings, typical grep for base64 "compatibility" reduces the size but not drastically. Is there a chance to get a hint on how to proceed?Solved10Views0likes3CommentsInfrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers
Can anyone help me with this question: Obtain a reverse Meterpreter session. What is the group ID of the current user? I have used the exploit exploit(windows/smb/psexec) to get the second token. But now I'm confused—don't I have to do a reverse shell? When I run this on the host, I'm the system user again. Lab: Infrastructure Hacking: Demonstrate Your Skills – Attacking Web ServersSolved28Views0likes2CommentsIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?129Views0likes4CommentsThe Cyber Readiness Outlook: 2025 Threat Reflection and 2026 Forecast
#Recorded on Jan 22nd 2026 Cybersecurity, from threat actors to the defensive strategies deployed against them, is undergoing a radical shift, forcing leaders to aggressively realign their strategy to meet escalating and evolving tactics. As we pivot from reflecting on the key challenges of 2025 to prioritizing our defensive posture for 2026, the need for proven capability over mere prevention has become an organizational imperative. Join us for this forward-looking discussion with Immersive’s Container 7 as they reflect on the year’s most significant developments and share the actionable intelligence required to fortify your defenses in the coming year. Cyber leaders will come away with: Key Lessons from 2025: Look back at the shift in adversary tactics, from the decrease in complex zero-day exploits toward supply chain compromises and chaotic threat actor behaviors, leading to the increase in pressure for ransom payments. The AI-Driven Development Risk: Take an uncompromising look at how the rush to deploy AI functionality is compromising security, while threat actors leverage AI for massive-scale noise generation and volume-based attacks. The Mandate for Proven Preparation: See the data-backed case for why security budgets must shift from focusing solely on prevention to practicing and proving response capabilities. Strategic Outlook for 2026: Learn about strategies for securing connected supply chains and complex infrastructure and understand the increasing demand for hyperspecific, tailored exercises.76Views0likes0CommentsAI: Plugin Injection – Demonstrate Your Skills
Hi I have a issue/problem here. I found the flaw in DirectoryListingPluginOld that you can craft a argument that executes a 2nd command. But everything I try, is rejected. With "&&" or ";" and then "less", "cat", "head". I even try to escape with "\\000" or "\\x00" the whole argument. I saw working solutions on reddit, but they don't work for me. Even after multiple tries. Is it possible, that the LLM is more secure regarding malicious prompts now? Thanks for a hint. BR42Views0likes1CommentRadare2 Reverse Engineering: Ep.2 – Windows Binary Part 2; Final Question
I have managed to find the answer to Questions 1-4 of this lab, however I can't seem to identify the answer to the final question (Question 5 - What is the token?). I have run the binary and I get the “You have not met the requirements” message. I understand that there is an some type of execution error within the binary that I must correct for it to work properly however I have not been able to locate the error in order to analyze it and attempt to correct it. Any insight or guidance on what I'm missing / doing incorrectly would be greatly appreciated. Thanks in advance. I am not getting a prompt to provide the password. I am not seeing the prompt to use the calculator to find the answer to the calculation that is presented. I can see that there is a reference to a token.txt file but I can’t seem to get access to the file to determine what the token value is.61Views0likes2Comments