immersive labs
153 TopicsNeed help in Splunk Lab!
I am attempting the Splunk collection under Upskill. In the final lab i.e. Demonstrate your skill lab, I am getting stuck at a particular task. This is the prompt that I need to solve. The problem is there is no field for Destination IP in the log. Whenever I search according to the prompt, no results are returned and the question won't take 0 as an answer. Please help me move forward.34Views0likes2CommentsAI Agent Governance: Auditing an Over-Privileged Agent
Hi, i solved every Task exept 16 i reviewed metrolio-finance-agent-role metrolio-finance-lambda-role and the Trust relationship Idont know what to do, i cant edit the trust policy either. While reviewing the execution role in the IAM console, examine the role's configuration. Check the Trust relationships tab and review which services are permitted to assume this role. Now consider: if Metrolio deployed additional Bedrock agents for other departments (HR, customer service, procurement), and each agent assumed this same execution role, what would happen? This means: Compromising one agent's permissions exposes the permissions of all agents sharing the role. AWS CloudTrail records the shared role ARN as the actor for every action – you can't determine which agent performed a specific action. Non-repudiation is destroyed.Solved40Views1like3CommentsHelp with Cross Site Request Forgery (Twooter)
Hi folks, I'm having a hard time getting past the Cross Site Request Forgery lab - specifically I'm not sure what sort of payload I can use to obtain the username of the scraper. I can get their IP address using just a link and I've tried a range of scripts hosted on my machine which I then link to in my 'twoots' but there's no connection at all. I'd be really grateful for any direction as to the sort of payload that could capture the necessary information. Thanks, JonathanSolved291Views0likes5CommentsAI: Plugin Injection - Demonstrate Your Skills
I cannot get the token.txt contents. I have tried 1. The following command in many forms (head, less, cat): 2. Attempted the command many times in the same session. Get a response that is about the same as above. 3. Restarted the systems many times. Tried it many different days. 4. Listed out plugins thought chat and do not see DirectoryListingPluginOld Really would like to complete this lab. Thanks!63Views0likes7CommentsRansomware: LockBit
I can't figure out what question 7 is looking for as the answer. I ensured I was looking at logs with an EventType of SetValue, I ensured it was LockBit.exe doing the event, but nothing I've tried from that works for the answer. Either I'm querying something wrong, or27Views0likes1CommentAI: Plugin Injection – Demonstrate Your Skills
Hi I have a issue/problem here. I found the flaw in DirectoryListingPluginOld that you can craft a argument that executes a 2nd command. But everything I try, is rejected. With "&&" or ";" and then "less", "cat", "head". I even try to escape with "\\000" or "\\x00" the whole argument. I saw working solutions on reddit, but they don't work for me. Even after multiple tries. Is it possible, that the LLM is more secure regarding malicious prompts now? Thanks for a hint. BR133Views0likes2CommentsNetcat: Advanced Features last question (9)
I'm supposed to do a reverse bind using an netcat website. it hangs and the client and there is no feedback on the netcat website that the listener is working. i don't need the course i was taking it this one for fun, but fun it hasn't been.48Views0likes2CommentsIncident Response Introduction to Detection Engineering: Ep.5 – Custom Alerting
Task 3 - Note: It may take a couple of minutes for the token to appear in the index. I'm struggling with the python that it's been taking too long to create a custom_alert_index to autimatically complete it. it's in Task 3 and I need the good code for the task to be completed and the token as well.73Views1like2CommentsSnort Rules Ep.10 Q7
Stuck in Q7: Identify the suspicious domain that appears in both PCAP files. Create a Snort Rule to detect packets using this domain from the IP address in question 2. I've identified the domain used by the IP address in Q2. I've tried different ways but can't seem to narrow it down. Already spent so much time with this one question. I've answered 12 of 13. This is the only one left and I don't know what I'm missing. Am I misunderstanding the question? Here's my rule: alert tcp any any -> any 80 (msg: "Testing Alert" ; sid:1000001; content:"7b2cdd48.ngrok.io";) I've tried modifiers, I tried narrowing filter to just GET methods, actually specifying the destination or source IP and ports, adding "http://" to content. Sometimes I would narrow it down to matching 4 packets which is still "too many", or down to two packets, which is "not enough"... which tells me I need to match three packets. Any hints would be much appreciated at this point. Thanks!37Views0likes1Comment