Confusion on Cyber Fundamentals Linux CLI ep.16 question 6
Question 6 seems fairly straight forward but I have yet to stumble on the combination of commands the lab is looking for. The question is "In a single line: runsleep 600to sleep in the background for 10 minutes then run touch emptyfile in the foreground to create an empty file." At first glance it seems to be leading the student to try something like sleep 600 & && touch emptyfile but that's invalid syntax. I've tried ( sleep 600 & ) && touch emptyfile but that doesn't work, I suspect because the && sees the success from the () being executed and immediately runs touch. I've tried ( sleep 600 && touch emptyfile ) & but after 10 minutes of waiting the lab never "detects" success which I'm guessing because the touch is ran from the background. I can't find the magic combination to satisfy a sleep command running in the background and then a touch command running in the foreground in a single oneline statement. Any hints would be appreciated, greatly.Solved20Views1like1CommentCybersecurity Results Month: What Are Your Plans?
With organizations worldwide turning their focus to cybersecurity awareness this October, we’re flipping the script! Say goodbye to Awareness Month and hello to Cybersecurity Results Month. It’s time to move from talk to action and start delivering real results, because simply raising awareness is no longer enough to tackle today’s evolving cyber threats. As we kick off Cybersecurity Results Month here at Immersive Labs HQ, we’re curious to know about your plans. How is your team promoting cyber resilience during October? How are you driving results? What programs have you run in previous years? What has worked and what hasn’t? We’d love you to share your insights and experiences with fellow peers and experts, and through that, contribute to the collective knowledge of the community. We’re looking forward to your thoughts!111Views9likes5CommentsDoS Practical
Hello again, I am working on another lab - The DoS practical in the networking module. I have been combing the packets with a fine tooth comb and can’t find any info on the Crypto currency it’s after or the last two questions either. Any pointers would be greatly appreciated. I spent 2 hours combing packets and reading packet data and I just couldn’t see anything. I will endeavour to keep trying!! I tried filtering by HTTP, but couldn’t figure out how to filter HTTP packets coming from the DoS tool or find info on the Tool used in the DoS attack. thanks again scottSolved42Views1like3CommentsWhat are you reading?
Hey everyone, all good? With a background in IT and networking that transitioned into cybersecurity, I've always enjoyed read and studying the subject. This week a friend surprised me with this gift, and i thought i would share it with you. It's a networking book (who doesn't enjoy a networking book right?) trust me, this one's special. The Network basics for Hackers is written by Occupytheweb. He is a cybersecurity and digital forensics consultant with loads of experience has some amazing books in the ethical hacking and cybersecurity community. You might have already read his Linux Basics for Hackers that offers practical, hands-on tutorials that teach essential Linux skills while using hacking tools like Kali Linux. So while I dive into this new book over the next week, I'm curious - what cybersecurity books are you currently reading? Any recommendations?47Views1like0Comments