immersive labs
103 TopicsAgents Skill-Building with Gemini CLI
Hi, I'm stocked at the task 4 for the Agents Skills in Building with Gemini CLI, I have completed the steps and also the rest of the task but task 4 will not show as completed, can anyone offers some guidance or hint. The SKILL.md file has been created as the instructions and I have already tried to create it testing some workarounds but no success. Thanks4Views0likes0CommentsIntro to Python Scripting Building an IDS
I am stuck on task 5 of the lab and het this error: from scapy.all import sniff from scapy.layers.inet import IP, TCP ip_connections = {} PORT_SCAN_THRESHOLD = 10 def packet_callback(packet): if packet.haslayer(IP) and packet.haslayer(TCP): ip_src = packet[IP].src port_dst = packet[TCP].dport if ip_src not in ip_connections: ip_connections[ip_src] = set() ip_connections[ip_src].add(port_dst) if len(ip_connections[ip_src]) > PORT_SCAN_THRESHOLD: print(f"Alert! Possible port scan detected from IP: {ip_src}") ip_connections[ip_src] = set() sniff(prn=packet_callback, store=0) Traceback (most recent call last): File "/usr/lib/python3.12/idlelib/run.py", line 580, in runcode exec(code, self.locals) File "<pyshell#6>", line 1, in <module> File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 1311, in sniff sniffer._run(*args, **kwargs) File "/usr/lib/python3/dist-packages/scapy/sendrecv.py", line 1171, in _run sniff_sockets[_RL2(iface)(type=ETH_P_ALL, iface=iface, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3/dist-packages/scapy/arch/linux.py", line 484, in __init__ self.ins = socket.socket( ^^^^^^^^^^^^^^ File "/usr/lib/python3.12/socket.py", line 233, in __init__ _socket.socket.__init__(self, family, type, proto, fileno) PermissionError: [Errno 1] Operation not permitted9Views0likes1CommentSOC Analyst – Advanced / Malware Analysis / CookieMiner
The task 6 says "Use strings to recover a Base64 string from the memory image and decode it." The output of strings vs memory image produces a file with about 4M strings, typical grep for base64 "compatibility" reduces the size but not drastically. Is there a chance to get a hint on how to proceed?Solved12Views0likes3CommentsInfrastructure Hacking: Demonstrate Your Skills – Attacking Web Servers
Can anyone help me with this question: Obtain a reverse Meterpreter session. What is the group ID of the current user? I have used the exploit exploit(windows/smb/psexec) to get the second token. But now I'm confused—don't I have to do a reverse shell? When I run this on the host, I'm the system user again. Lab: Infrastructure Hacking: Demonstrate Your Skills – Attacking Web ServersSolved30Views0likes2CommentsIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?130Views0likes4CommentsAI: Plugin Injection – Demonstrate Your Skills
Hi I have a issue/problem here. I found the flaw in DirectoryListingPluginOld that you can craft a argument that executes a 2nd command. But everything I try, is rejected. With "&&" or ";" and then "less", "cat", "head". I even try to escape with "\\000" or "\\x00" the whole argument. I saw working solutions on reddit, but they don't work for me. Even after multiple tries. Is it possible, that the LLM is more secure regarding malicious prompts now? Thanks for a hint. BR43Views0likes1Comment