0% found this document useful (0 votes)
28 views

Activity-Report (1)

The document details the activity report for a user named Analinda, who completed 40 labs and earned a total of 5620 points. Each lab entry includes the date, lab title, description, and points earned, covering various cybersecurity topics such as infrastructure hacking, credential access, and Linux command line skills. Additionally, it provides an overview of Immersive Labs as a platform for interactive cyber skills training.

Uploaded by

analindatoh.at
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Activity-Report (1)

The document details the activity report for a user named Analinda, who completed 40 labs and earned a total of 5620 points. Each lab entry includes the date, lab title, description, and points earned, covering various cybersecurity topics such as infrastructure hacking, credential access, and Linux command line skills. Additionally, it provides an overview of Immersive Labs as a platform for interactive cyber skills training.

Uploaded by

analindatoh.at
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CSI-2024S2-222826H Analinda

Completed 40 labs earning 5620 points.

Activity Report

Date Lab Description Points Earned

Recall the cookies and login data files


Mimikatz and Chrome
2025-01-25 that Chrome stores in 200
Passwords
%LOCALAPPDATA%
Infrastructure Hacking:
Analyze an LDAP post exploitation
2025-01-25 OpenLDAP Plaintext 100
technique
Passwords
Infrastructure Hacking: Use Python's SimpleHTTPServer to
2025-01-25 100
SimpleHTTPServer spawn web servers

2025-01-25 SQL Injection: sqlmap Practice applying sqlmap to a database 200

Credential Access: Using Perform attacks on different network


2025-01-25 200
Hydra protocols

Infrastructure Hacking: Perform a Pass-the-Hash attack on a


2025-01-25 200
Pass-the-Hash vulnerable server

2025-01-25 John the Ripper Exposure to John the Ripper tool chain 100

Credential Access:
Describe the benefits of salting
2025-01-25 Password Hashing and 100
passwords
Salting Techniques
Netcat: Ep.1 –
2025-01-25 Use Netcat for various tasks 100
Connecting with Netcat

Infrastructure Hacking: Recognize how XSL files can obscure


2025-01-24 200
XSL Script Processing malicious code with embedded scripts

www.immersivelabs.com | +44 (0)20 3893 9101 | Immersive Labs, The Programme, All Saints' Street, Bristol, BS1 2LZ
Activity Report Page 2 of 3

Date Lab Description Points Earned

Infrastructure Hacking: Identify exploit attempts that abuse the


2025-01-24 100
Sudo Caching sudo caching technique

Infrastructure Hacking: Be able to identify the risk of passing


2025-01-24 100
Bash History credentials with the command line

Infrastructure Hacking: Inspect suspicious files and analyze their


2025-01-24 100
Space After Filename function

Infrastructure Hacking:
2025-01-24 Identify weak cryptographic ciphers 200
SSL Scanning

Scanning: DNS Zone Analyze DNS information revealed by a


2025-01-23 200
Transfer zone transfer

Scanning: Banner
2025-01-23 Identify and enumerate common services 100
Grabbing

Scanning: Network Operate various network scanning tools


2025-01-23 100
Scanning to identify open ports

2024-12-11 Snort Rules: Ep.3 – HTTP Demonstrate usage of Snort rules 300

2024-12-11 Snort Rules: Ep.2 – DNS Create Snort rules for DNS events 300

Snort Rules: Ep.1 – Demonstrate proficiency in basic Snort


2024-12-11 200
Introduction rules

Windows Concepts:
2024-11-06 Analyze the function of CertUtil 100
CertUtil

Nmap: Ep.2 – Using


2024-11-06 Recall how to run Nmap 100
Nmap

2024-11-06 Msfvenom Use msfvenom to create a payload 300

Locate Cyber Threat Information from


2024-10-28 Threat Hunting: STIX 40
within STIX objects

Linux CLI: Ep.12 – Using


2024-10-19 Recognize how the find command work 200
Find

www.immersivelabs.com | +44 (0)20 3893 9101 | Immersive Labs, The Programme, All Saints' Street, Bristol, BS1 2LZ
Activity Report Page 3 of 3

Date Lab Description Points Earned

Linux CLI: Ep.14 – Using


2024-10-19 Describe how `screen` works in the CLI 100
Screen

Linux CLI: Ep.13 – Employ searching techniques to find


2024-10-19 100
Searching and Sorting patterns in files

Linux CLI: Ep.16 – Identify the different ways of combining


2024-10-19 200
Combining Commands commands on the terminal

Linux CLI: Ep.15 –


2024-10-19 Recognize file hashes 100
Generating File Hashes

Linux CLI: Ep.11 – Using


2024-10-18 Recall what the SSH protocol is 100
SSH and SCP

Linux CLI: Ep.10 – Using


2024-10-17 Identify different user privileges in Linux 100
Sudo

Linux CLI: Ep.8 – Modify text within files using basic


2024-10-17 200
Manipulating Text command line tools

Linux CLI: Ep.7 – Using


2024-10-17 Count elements in a file using the wc tool 200
wc

Linux CLI: Ep.9 – Stream Describe how data can be manipulated


2024-10-17 100
Redirection via the terminal

Linux CLI: Ep.4 – Recall the Linux CLI commands explored


2024-10-17 100
Changing Things in the lab
Linux CLI: Ep.1 –
2024-10-16 Introduction to the Linux Recall Linux command line fundamentals 40
Command Line Interface
NIST Cybersecurity List the three main components of the
2024-10-16 40
Framework NIST Cybersecurity Framework
Linux CLI: Ep.2 – Getting
Recall fundamental concepts of the Linux
2024-10-16 Started with the 100
terminal
Terminal
Linux CLI: Ep.5 – File
2024-10-16 Be able to read Linux file permissions 100
Permissions

Linux CLI: Ep.3 – Moving Navigate through directories on the


2024-10-16 100
Around command line

About Immersive Labs


Immersive Labs is the world’s first fully interactive, on-demand, and gamified cyber skills platform. Our technology
delivers challenge-based assessments and upskilling exercises which are developed by cyber experts with access to the
latest threat intelligence. Our unique approach engages users of every level, so all employees can be equipped with
critical skills and practical experience in real time.

www.immersivelabs.com | +44 (0)20 3893 9101 | Immersive Labs, The Programme, All Saints' Street, Bristol, BS1 2LZ

You might also like