💻🔐 Study Group Announcement - Offensive Cybersecurity Lab Chosen! 💻🔐
You may have heard that we're launching a Study Group within the community. And for the first time, the votes are in, and we’re diving into Offensive Cybersecurity for our very first Study Group 🖥️💥 This week, we’ll be exploring hands-on tactics in offensive cybersecurity in a safe, controlled environment, and the chosen lab is Hack Your First Web App: Ep.1 – Ozone Energy How to get involved: Dive into the lab: Get started on the lab and challenge yourself to complete it by the end of the week. Join the discussion: Don’t forget to share your experiences, ask questions, and drop any tips or tricks you’ve picked up along the way in this forum discussion. Support each other: This is all about collaboration—whether you’re struggling with a concept or want to share an "aha" moment, jump into the conversation! Remember, we’ll re-vote on Friday for next week’s lab, so stay engaged and help shape where this study group goes. Let’s learn together and level up our skills! Every community member who has access to an Immersive license is welcome to join this study group. Happy hacking! 🔓💻225Views3likes9CommentsOWASP 2017 Java: Underprotected APIs
I am stuck on the "OWASP 2017 Java: Underprotected APIs" challenge. I have tried accessing "<Target URL>/FileDownloadServlet?path=/etc/&file=flag.txt," for which I received the error message "HACKING DETECTED! Your activity has been logged, and authorities have been informed." I created a user with admin privileges and used its session to access the above-mentioned URL, but that also didn't work.Solved125Views2likes1CommentAnyone finished the "Etherium Smart Contracts"?
Need help on three labs on the Ethereum smart contracts. I managed to do some but stuck on 3 of them so far: Ethereum: Contract Challenge 2 – Sisyphean Brute force the hash? Ethereum: Contract Challenge 4 – Random Can't get my code to work for prediciting the numbers... Ethereum: Contract Challenge 5 – Robin Hood Absolutely no idea.... Any help would be appreciated :)112Views2likes10Comments💻🔐 Study Group Vote Revealed! Get Involved! 💻🔐
The Votes are In! For the second week running, you've chosen an Offensive lab for Study Group. What are we studying? This week, we've selected Tuoni 101: Ep.2 – Listeners where you'll explore the Tuoni framework often used in red teaming and penetration testing, configure and launch two different Tuoni listeners and identify and stop a listener. How can I get involved? Dive into the lab: Get started on the lab and challenge yourself to complete it by the end of the week. Join the discussion: Don’t forget to share your experiences, ask questions, and drop any tips or tricks you’ve picked up along the way in this forum discussion. Support each other: This is all about collaboration—whether you’re struggling with a concept or want to share an "aha" moment, jump into the conversation! Remember, we’ll re-vote on Friday for next week’s lab, so stay engaged and help shape where this study group goes. Let’s learn together and level up our skills! Every community member who has access to an Immersive license is welcome to join this study group.78Views2likes5CommentsReverse Engineering (Offensive) JavaScript Analysis: JSDetox
I'm stuck at below two questions Q6: Which variable does the initial script try to return? Q8: The exploit kit contains a large block of hex encoded shellcode stored in a variable. This shellcode is also XOR encoded. What is the single byte xor key? (In the format 0xNN e.g. 0x11.) So far I downloaded the HTTP objects via Wireshark, extracted the script to JSDetox then decoded base64 strings which resolves to other 2 scripts. With these steps I was able to answer other questions but I can't go any further, any guidance? Thanks in advanceSolved270Views1like10Comments