other
12 TopicsSnort Rules: Ep.9 – Exploit Kits
I am pulling my hair with question number 8 Create a Snort rule to detect the third GET request in the second PCAP file, then submit the token. This one should do it but it is not working. alert tcp any any -> any any (msg:"detect the third GET request"; content:"e31e6edb08bf0ae9fbb32210b24540b6fl"; sid:1000001) I tried so many rules base on the first GET header and still unable to get the token. Any tips?45Views0likes1CommentSnort Rules: Ep.7 – Lokibot Infection Traffic
I need help with the last question please. I tried so many rules and I am still getting it wrong 13-Create a Snort rule to detect this User-Agent string in the HTTP header for connections using port 49167, then submit the token. Tried this one which to me it should be able to work. alert tcp any any -> any 49167 (msg:"User-Agent match"; content:"Mozilla/4.08 (Charon; Inferno)"; sid:5000031;) alert tcp any any -> any 49167 (msg:"User-Agent Mozilla/4.08 (Charon; Inferno) detected"; content:"User-Agent: Mozilla/4.08 (Charon; Inferno)"; http_header; sid:5000020;)Solved42Views0likes2CommentsWeb App Hacking (Lab series): CVE-2022-42889 (Text4Shell) – Offensive
Hey all, Anyone have any luck with CVE-2022-42889 (Text4Shell) – Offensive? The first few questions were easy enough, but I have spent hours on the last one trying to get the token. On the attacker server, I can setup the listener, I don't believe my problem is there. I have tried many variations of URL encoding and various nc commands in the payload including ones similar to the blog post. If any one has any suggestions I would love to hear them! Thanks. JSolved109Views1like3CommentsModern Encryption: Demonstrate your skills
I am in the final lab of this collection and the step 3 I need to encrypt the file using aes 256 encryption using the following command and similar other commands I am using for setup 4 & 5 however the commands execute succesfully and a encrypted file is generated however a key file is not generated to decrypt the remaining for encrypted file to complete the lab. I need the help to solve this lab and get the badge. step 3- openssl enc -aes-256-cbc -a -pbkdf2 -nosalt -in plaintext_1.txt -out plaintext_1.enc step 4- Encrypt a file using RC4 openssl enc -rc4 -d -pbkdf2 -nosalt -in plaintext_2.txt -out plaintext_2.enc step 5- Encrypt a file using RC4 openssl enc --des-ede3-cbc -d -pbkdf2 -nosalt -in plaintext_3.txt -out plaintext_3.enc203Views1like5CommentsFoundational Static Analysis: API Analysis
Hi all, I'm stuck in this part, where using Ghidra, I have to find where the Windows API GetModuleHandleA is used, in the binary called exercise_two.exe, and once located, find the parameter of this function. Taking a look about GetModuleHandleA, there's no references or calls to API in any part of the code. Also tried to look for references to GetProcAddress or LoadLibrary and nothing. Am doing something wrong? Any idea to find the "parameter" of the function that calls to the API?. Is the only question from this part remaining... Thanks and regards.59Views2likes1CommentViewing combined Pioneer info??
Hola, Random idle thought, as I've just got the Pioneer badge for completing the new Typelib: COM Persistence lab. Is there way to easily view a list of who has which Pioneer badges? I'd be very curious to see a local leaderboard of who has how many, and for which labs/sections... Does it show up in data explorer or the other logging stuff anywhere? Cheers, Steve.Solved74Views1like1CommentConfusion on Cyber Fundamentals Linux CLI ep.16 question 6
Question 6 seems fairly straight forward but I have yet to stumble on the combination of commands the lab is looking for. The question is "In a single line: run sleep 600 to sleep in the background for 10 minutes then run touch emptyfile in the foreground to create an empty file." At first glance it seems to be leading the student to try something like sleep 600 & && touch emptyfile but that's invalid syntax. I've tried ( sleep 600 & ) && touch emptyfile but that doesn't work, I suspect because the && sees the success from the () being executed and immediately runs touch. I've tried ( sleep 600 && touch emptyfile ) & but after 10 minutes of waiting the lab never "detects" success which I'm guessing because the touch is ran from the background. I can't find the magic combination to satisfy a sleep command running in the background and then a touch command running in the foreground in a single oneline statement. Any hints would be appreciated, greatly.Solved446Views1like1Comment