other
20 TopicsWindows Basics: Demonstrate your knowledge Q11.
Hello, I'm stuck on this question. Though cmd returns the change as being successful, the lab isn't marking the task as complete. I've tried using both Task Scheduler and cmd to change the task action. I've also tried to create the script itself in case it didn't exist and that's what's causing the issue. It says the parameters have been changed, but I'd really appreciate any pointers. Thank you42Views1like1CommentTerraPoint: Ep.10 – Global Synthesis
This is a crazy challenge. We need to get within 10m distance from a place in the middle of banana plantation in probably East Africa. No sign of any kind is visible. How do I even start? Based on the good condition of the paved road, my best guess is somewhere along Rwanda's National Route 1, but that's both uncertain and does not make the final pinning any easier.91Views0likes3CommentsICS Malware: Triton ModuleNotFoundError: No module named 'pefile
when running this command: python3 python_exe_unpack.py -i /home/iml-user/Desktop/Lab-Files/trilog.exe -o /home/iml-user/Desktop/Lab-Files Traceback (most recent call last): File "python_exe_unpack.py", line 14, in <module> import pefile ModuleNotFoundError: No module named 'pefile' Tried pip3 install pefile but failed. Please advise.97Views0likes3CommentsSnort Rules: Ep.9 – Exploit Kits
I am pulling my hair with question number 8 Create a Snort rule to detect the third GET request in the second PCAP file, then submit the token. This one should do it but it is not working. alert tcp any any -> any any (msg:"detect the third GET request"; content:"e31e6edb08bf0ae9fbb32210b24540b6fl"; sid:1000001) I tried so many rules base on the first GET header and still unable to get the token. Any tips?Solved228Views0likes3CommentsBurp Suite Basics: Intruder - Stuck on missing password.txt
Hello community, I'm stuck in lab https://mercedes-benz.immersivelabs.online/v2/labs/burp-basics-intruder/series/burp-suite. The attack to carry out is about a brute-force guess on mfogg1's password using the intruder. The briefing states: Brute force the login page using the password.txt list against the user mfogg1. I'm missing that password.txt file, where the heck is it? I carried out an intruder attack (Cluster bomb) using well known passwords from /usr/share/wordlists/metasploit/burnet_top_1024.txt without success. Even worse, testing those 200 attacks (there are only 200 passwords in that file), tooks quite a considerable time. I must have missed something about the location of that obscure password.txt file. I'm stuck. Perhaps someone can shed a light on this. Thanks in advance, WolfgangSolved114Views0likes1CommentImmersive lab Ghidra, Ep2.
In This lab I have answered all of the questions except question 4 - "Using the function graph on the main function, what is the starting address of the last basic block?" It is not clear which block the "last" one is. I have entered the starting address of all basic blocks but none are correct. Is there some secret to this question that I haven't discovered yet?Solved139Views1like4CommentsKusto Query Language: Ep.7 – String Processing Q4
I am stuck in Q4, and it seems that the query matches the requirements of the question and generates exactly what it is asking for. However, the lab does not accept the full substring command used in the query as the correct answer. Please let me know if I am missing anything. Thank you.Solved133Views0likes3CommentsSnort Rules: Ep.7 – Lokibot Infection Traffic
I need help with the last question please. I tried so many rules and I am still getting it wrong 13-Create a Snort rule to detect this User-Agent string in the HTTP header for connections using port 49167, then submit the token. Tried this one which to me it should be able to work. alert tcp any any -> any 49167 (msg:"User-Agent match"; content:"Mozilla/4.08 (Charon; Inferno)"; sid:5000031;) alert tcp any any -> any 49167 (msg:"User-Agent Mozilla/4.08 (Charon; Inferno) detected"; content:"User-Agent: Mozilla/4.08 (Charon; Inferno)"; http_header; sid:5000020;)Solved147Views0likes2Comments