questions & feedback
6 TopicsCVE-2020-11651 (SaltStack RCE) – Defensive
Using the PCAP file located on the Desktop, what are the last five characters of the root_key that was sent to the attacker? I am stuck with question number 5. Any Hint? I tried tcp.payload matches "_send_pub" and just tcp.port == 450611Views0likes0Commentshelp with A Christmas Catastrophe: A Letter to Santa
I am in the scalation privileges part. Tried to create a symlink to /root/root.txt and to /root in /etc/letters/ waiting cron /etc/chmod.sh takes ownership with chmod 666 instruction and then extract token, but doesn't work Any help? Is there something missing?95Views0likes5CommentsCredential Access - NTDS
Got down to the last two questions and I felt like I've tried all suggestions in the briefing. Can anyone help out with the last two question? Also, the "secretsdump.py -ntds <ntds.dit path> -system <SYSTEM hive path> LOCAL" isn't working but tried "impacket.examples.secretsdump" and it doesn't throw an error, but also doesn't throw any output.188Views1like3CommentsOperation Kobold - Defensive SOC Track 2
I need help with these two questions could you please guide me Continuing your analysis of the file identified in Question 29, what is the address of the C2 Server? What is the value of the watermark found in the executable identified in Question 29?154Views2likes2CommentsWondering about potential jobs offered after completion of labs....
Hi - I was wondering about the jobs available after completing the labs. I've been a support engineer for five years now, most recently a senior engineer at a Silicon Valley MSP. I've already earned a one-year college Cybersecurity Networking certification from a community college (with a 3.9 GPA) and the Security+. Can someone give me an idea of potential companies? Also are any of the positions remote? I live in the northern California mountains....186Views2likes1Comment