questions & feedback
42 TopicsTrick or Treat on Specter Street: Widow's Web
I am very stucked in Trick or Treat on Specter Street: Widow's Web I can't do none of the questions, but in any case I start by 4th that is the first answerable one Your first task is to simulate the loyal Crawlers. Run legitimate-crawler and inspect the output in Lab-Files to observe their behavior. To simulate the rogue Crawlers, you must discover the hidden paths on the website. Read the blog posts – they contain clues. Disallow these in Website-Files/robots.txt and run malicious-crawler. Inspect the output in Lab-Files. What is the token? I have created the robots.txt file since I understand that malicious-crawler goes expressedly there. My robots.txt contains all url's I can imagin Disallow: /secret Disallow: /treat Disallow: /hidden Disallow: /crypt Disallow: /warden Disallow: /rituals Disallow: /witch-secrets Disallow: /admin Disallow: /vault Disallow: /uncover Disallow: /post1 Disallow: /post2 Disallow: /post3 Disallow: /post4 Disallow: /contact Disallow: /drafts/rituals But the result of malicious-crawler.txt doesn't give me either a token nor a hint I have curl-ed all pages looking for words as token and nothing. I have found some key words in http://127.0.0.1:3000/witch-secrets as intercepted-incantations, decoded them and nothing. I have searched in spider-sigthings.log what hapened at 3.00 am but nothing Can someone gime me a hint?376Views0likes9CommentsCTI First Principles: Threat Actors and Attribution Question 8
For the question: Which sub-technique has been attributed to this threat actor in the Credential Access Tactic? as the briefing was talking about phishing through attachment, for some reason, the answer Spearphishing Attachment, was not correct. I am wondering about where else I shoud be looking into as the main report mostly taked about email delivery methods in terms of initial access to credentials32Views0likes3CommentsGemini CLI Lab issue
Hi, I'm running into an error when trying to access the sandboxes lab in the Building with AI: Gemini CLI. It is probably something general and has been there for weeks so this is not letting me finishing the path, all the other labs have been completed now but would like to know if anyone is experiencing this same issue or able to start the lab?.47Views0likes6CommentsMicrosoft Sentinel Deployment & Log Ingestion: Ingesting Platform Logs via Diagnostic Settings
Hello Immersive Labs community, I’ve been working through the lab tasks and successfully completed tasks 1 through 6. However, I’m stuck on task 7, which asks: "A storage account has been deleted. What would be the data type of the generated log?" The task seems oddly described, and I can’t find any clear hints in the lab briefing or online resources. I’ve tried querying various data types like AzureActivity, AuditLogs, StorageBlobLogs, StorageFileLogs, and others, but none seem to fit correctly. Could anyone provide guidance or confirm which data type is actually relevant for this scenario? Are there any specific tips or resources I might be missing? Thanks in advance for your help!15Views0likes1CommentHelp with Snort Rules: Fake Tech Support Popup
I'm stuck on parts 7-9 part 7 wants me to Create a Snort rule to detect the domain 'site.topwebsite4.xyz', then submit the token. alert udp any any -> any 53 (msg:"site.topwebsite4.xyz"; sid:1000001; rev:1;) is the only snort rule giving me anything, but gives me 4 results, which is too many. I also tried adding the ports from said results to part 8, but none of those ports are the correct ports for the question. What do I do?Solved60Views0likes2CommentsNo files show up in the Microsoft Azure Basics: Function Apps lab
Hello all. No files show up in the Microsoft Azure Basics: Function Apps lab so I cannot complete it. When I open VSCodium and open the /home/iml-user/Desktop/http_queue folder there are NO FILES inside it. I tried signing in to Azure extension from the Azure button in VSCodium and that got me the wokspacd but still nothing in the home http_queue folder. Does anyone else have this issue? Am I doing something wrong? Per the instructions there should be files in that folder See screenshots. Thank You.58Views0likes6CommentsGit Security: Git History
Hi all, I’ve been struggling for a while with the last question on this lab, question 7. Where you need to purge access_keys.json from the commit history and force push changes at the end. I’ve tried so many combinations that I’ve lost count. The most recent, which I don’t understand why it’s not working is: git log --diff-filter=A -- *.json To find the commits. git rebase -i <commit_hash> Then changing to edit in the text editor. git push origin --force To force push my changes. This is just one of many ways I’ve tried. Any help would be appreciated, it’s driving me a little mad haha. Thanks, JP34Views0likes1CommentIoT & Embedded Devices: Certificate Underpinning
I am also stuck on Step 5 and having trouble with the trigger. I have self-signed certs, an HTTP server listening on 443 (bound to 0.0.0.0) as well as a sniffer for anything coming from the target. I have tried to trigger the target to connect using: for i in {1..5}; do echo '{"Update":"1","ClientId":"AXG1337VFXL","Server Ip":"<KALI_IP>"}' | nc -u <TARGET_IP> 8080; sleep 2; done Can anyone point me in the right direction?177Views0likes4CommentsAI: Plugin Injection – Demonstrate Your Skills
Hi I have a issue/problem here. I found the flaw in DirectoryListingPluginOld that you can craft a argument that executes a 2nd command. But everything I try, is rejected. With "&&" or ";" and then "less", "cat", "head". I even try to escape with "\\000" or "\\x00" the whole argument. I saw working solutions on reddit, but they don't work for me. Even after multiple tries. Is it possible, that the LLM is more secure regarding malicious prompts now? Thanks for a hint. BR89Views0likes1Comment