questions & feedback
62 TopicsCTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the answer Spearphishing Attachment, was not correct. I am wondering about where else I shoud be looking into as the main report mostly taked about email delivery methods in terms of initial access to credentials26Views0likes2CommentsMicrosoft Sentinel Deployment & Log Ingestion: Ingesting Platform Logs via Diagnostic Settings
Hello Immersive Labs community, I’ve been working through the lab tasks and successfully completed tasks 1 through 6. However, I’m stuck on task 7, which asks: "A storage account has been deleted. What would be the data type of the generated log?" The task seems oddly described, and I can’t find any clear hints in the lab briefing or online resources. I’ve tried querying various data types like AzureActivity, AuditLogs, StorageBlobLogs, StorageFileLogs, and others, but none seem to fit correctly. Could anyone provide guidance or confirm which data type is actually relevant for this scenario? Are there any specific tips or resources I might be missing? Thanks in advance for your help!11Views0likes1CommentGemini CLI Lab issue
Hi, I'm running into an error when trying to access the sandboxes lab in the Building with AI: Gemini CLI. It is probably something general and has been there for weeks so this is not letting me finishing the path, all the other labs have been completed now but would like to know if anyone is experiencing this same issue or able to start the lab?.42Views0likes5CommentsHelp with Snort Rules: Fake Tech Support Popup
I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000001; rev:1;) is the only snort rule giving me anything, but gives me 4 results, which is too many. I also tried adding the ports from said results to part 8, but none of those ports are the correct ports for the question. What do I do?Solved59Views0likes2CommentsNo files show up in the Microsoft Azure Basics: Function Apps lab
Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES inside it. I tried signing in to Azure extension from the Azure button in VSCodium and that got me the wokspacd but still nothing in the home http_queue folder. Does anyone else have this issue? Am I doing something wrong? Per the instructions there should be files in that folder See screenshots. Thank You.56Views0likes6CommentsGit Security: Git History
Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tried so many combinations that I’ve lost count. The most recent, which I don’t understand why it’s not working is: git log --diff-filter=A -- *.json To find the commits. git rebase -i <commit_hash> Then changing to edit in the text editor. git push origin --force To force push my changes. This is just one of many ways I’ve tried. Any help would be appreciated, it’s driving me a little mad haha. Thanks, JP33Views0likes1CommentIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?170Views0likes4CommentsAI: Plugin Injection – Demonstrate Your Skills
Hi I have a issue/problem here. I found the flaw in DirectoryListingPluginOld that you can craft a argument that executes a 2nd command. But everything I try, is rejected. With "&&" or ";" and then "less", "cat", "head". I even try to escape with "\\000" or "\\x00" the whole argument. I saw working solutions on reddit, but they don't work for me. Even after multiple tries. Is it possible, that the LLM is more secure regarding malicious prompts now? Thanks for a hint. BR87Views0likes1Comment