Hello Friend NG
  • Posts

Title: Immersive Labs (Lightening write ups) Date: 06/10/2020 Category: labs

Okay, so last time I covered the overall impressions of immersive labs.

Once again, no spoilers:

Netcat: Do the things and copy-paste tokens. For extra interest, I found the script that generates tokens.

Server Identification: I’m not quite sure what you’re supposed to get from this one? Again, not without spoilers.

DLL Injection: as referenced last time, I had trouble with this as I didn’t realise restarting a machine didn’t kill the session. The principle is easy enough, and you have metasploit, but the correct path takes some digging. I also kept forgetting you can just spin up a http server from your attacker machine, for when you want to transfer files over.

Related

  • Constraints solving a silly number puzzle
  • On Contracts for Difference
  • Infosec is Not Like Boots
  • Notes on a Fortran Conversion
  • Denominate
  • Crack me if you can: What's the response to the Arecibo Message?
  • Bowtie Diagrams are Good, Actually
  • An XOR cryptanalysis writeup
  • The BB84 scheme
© CC BY-NC 4.0 2024