immersive labs
140 TopicsThreat Research: Dependency Confusion lab -Listener not showing a successful connection with target server
Hello Community, In the lab, I could see that listener is not showing "connection received message". Hence unable to execute any command there. Any help would be appreciated. Below are the screenshots from terminal listener and terminal .7Views0likes0CommentsHelp with Snort Rules: Fake Tech Support Popup
I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000001; rev:1;) is the only snort rule giving me anything, but gives me 4 results, which is too many. I also tried adding the ports from said results to part 8, but none of those ports are the correct ports for the question. What do I do?Solved31Views0likes2CommentsGemini CLI Lab issue
Hi, I'm running into an error when trying to access the sandboxes lab in the Building with AI: Gemini CLI. It is probably something general and has been there for weeks so this is not letting me finishing the path, all the other labs have been completed now but would like to know if anyone is experiencing this same issue or able to start the lab?.6Views0likes0CommentsNo files show up in the Microsoft Azure Basics: Function Apps lab
Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES inside it. I tried signing in to Azure extension from the Azure button in VSCodium and that got me the wokspacd but still nothing in the home http_queue folder. Does anyone else have this issue? Am I doing something wrong? Per the instructions there should be files in that folder See screenshots. Thank You.36Views0likes6CommentsAI Plugin Injection
Greetings, I've found the old plugin that should ideally be used to get the AI to give access to token.txt But no matter how many times I try, directoryListingPluginOld and whatever Linux commands I try to chain together, does not help me out much. I have to do these trainings as part of my job, and I'm trying my best here, but it's a lot to balance the demands of this lab along with security alerts.66Views0likes5CommentsGit Security: Git History
Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tried so many combinations that I’ve lost count. The most recent, which I don’t understand why it’s not working is: git log --diff-filter=A -- *.json To find the commits. git rebase -i <commit_hash> Then changing to edit in the text editor. git push origin --force To force push my changes. This is just one of many ways I’ve tried. Any help would be appreciated, it’s driving me a little mad haha. Thanks, JP22Views0likes1CommentCTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the answer Spearphishing Attachment, was not correct. I am wondering about where else I shoud be looking into as the main report mostly taked about email delivery methods in terms of initial access to credentials22Views0likes1CommentIntro to Python Scripting Building an IDS
I am stuck on task 5 of the lab and het this error: from scapy.all import sniff from scapy.layers.inet import IP, TCP ip_connections = {} PORT_SCAN_THRESHOLD = 10 def packet_callback(packet): if packet.haslayer(IP) and packet.haslayer(TCP): ip_src = packet[IP].src port_dst = packet[TCP].dport if ip_src not in ip_connections: ip_connections[ip_src] = set() ip_connections[ip_src].add(port_dst) if len(ip_connections[ip_src]) > PORT_SCAN_THRESHOLD: print(f"Alert! Possible port scan detected from IP: {ip_src}") ip_connections[ip_src] = set() sniff(prn=packet_callback, store=0) Traceback (most recent call last): File "/usr/lib/python3.12/idlelib/run.py", line 580, in runcode exec(code, self.locals) File "<pyshell#6>", line 1, in <module> File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 1311, in sniff sniffer._run(*args, **kwargs) File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 1171, in _run sniff_sockets[_RL2(iface)(type=ETH_P_ALL, iface=iface, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3/dist-packages/scapy/arch/linux.py", line 484, in __init__ self.ins = socket.socket( ^^^^^^^^^^^^^^ File "/usr/lib/python3.12/socket.py", line 233, in __init__ _socket.socket.__init__(self, family, type, proto, fileno) PermissionError: [Errno 1] Operation not permitted24Views0likes2CommentsAgents Skill-Building with Gemini CLI
Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some guidance or hint. The SKILL.md file has been created as the instructions and I have already tried to create it testing some workarounds but no success. ThanksSolved28Views0likes2Comments