<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Valera1</title>
    <description>The latest articles on DEV Community by Valera1 (@sonyahack1).</description>
    <link>https://dev.to/sonyahack1</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3304122%2F75a2cc87-b5ea-4b8e-bc3d-37cdaee99947.png</url>
      <title>DEV Community: Valera1</title>
      <link>https://dev.to/sonyahack1</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sonyahack1"/>
    <language>en</language>
    <item>
      <title>TryHackMe - Mr Robot</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Mon, 23 Mar 2026 16:17:07 +0000</pubDate>
      <link>https://dev.to/sonyahack1/tryhackme-mr-robot-1iag</link>
      <guid>https://dev.to/sonyahack1/tryhackme-mr-robot-1iag</guid>
      <description>&lt;p&gt;Hello Friend.&lt;/p&gt;

&lt;p&gt;I just pwned a medium lab "Mr Robot CTF" on TryHackMe!&lt;/p&gt;

&lt;p&gt;Full writeup here:&lt;br&gt;
🔗 &lt;a href="https://github.com/sonyahack1/Try-Hack-Me/blob/main/THM_MrRobot/THM_MrRobot_CTF_Linux___20.03.2026.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/Try-Hack-Me/blob/main/THM_MrRobot/THM_MrRobot_CTF_Linux___20.03.2026.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>VulnHub - Empire:LupinOne (medium)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Sat, 29 Nov 2025 14:04:33 +0000</pubDate>
      <link>https://dev.to/sonyahack1/vulnhub-empirelupinone-medium-2p2p</link>
      <guid>https://dev.to/sonyahack1/vulnhub-empirelupinone-medium-2p2p</guid>
      <description>&lt;p&gt;Hi.&lt;br&gt;
I just pwned a medium machine "&lt;strong&gt;Empire: LupinOne&lt;/strong&gt;" on &lt;strong&gt;VulnHub&lt;/strong&gt;!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;T1595.002&lt;/strong&gt; - Active Scanning: Vulnerability Scanning&lt;br&gt;
&lt;strong&gt;T1595.003&lt;/strong&gt; - Active Scanning: Wordlist Scanning&lt;br&gt;
&lt;strong&gt;T1110.002&lt;/strong&gt; - Brute Force: Password Cracking&lt;br&gt;
&lt;strong&gt;T1133&lt;/strong&gt; - External Remote Services&lt;br&gt;
&lt;strong&gt;T1078.003&lt;/strong&gt; - Valid Accounts: Local Accounts&lt;br&gt;
&lt;strong&gt;T1548.003&lt;/strong&gt; - Abuse Elevation Control Machanism: Sudo and Sudo Caching&lt;/p&gt;

&lt;p&gt;🔗Full writeup here: &lt;a href="https://github.com/sonyahack1/VulnHub/blob/main/Empire_Lupinone/Empire_LupinOne___25.11.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/VulnHub/blob/main/Empire_Lupinone/Empire_LupinOne___25.11.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>VulnHub - Thales: 1. Writeup (Linux)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Thu, 20 Nov 2025 16:05:18 +0000</pubDate>
      <link>https://dev.to/sonyahack1/vulnhub-thales-1-writeup-linux-4mia</link>
      <guid>https://dev.to/sonyahack1/vulnhub-thales-1-writeup-linux-4mia</guid>
      <description>&lt;p&gt;🔥 Hi. I just pwned an Easy Machine "&lt;strong&gt;Thales: 1&lt;/strong&gt;" on VulnHub! &lt;/p&gt;

&lt;p&gt;Techniques implemented during the attack:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;T1595.002&lt;/strong&gt; - Active Scanning: Vulnerability Scanning T1110 - Brute Force&lt;br&gt;
&lt;strong&gt;T1190&lt;/strong&gt; - Exploit Public-Facing Application&lt;br&gt;
&lt;strong&gt;T1552.004&lt;/strong&gt; - Unsecured Credentials: Private Keys&lt;br&gt;
&lt;strong&gt;T1078.003&lt;/strong&gt; - Valid Accounts: Local Accounts&lt;br&gt;
&lt;strong&gt;T1053.003&lt;/strong&gt; - Scheduled Task/Job: Cron&lt;/p&gt;

&lt;p&gt;🔗Full writeup here: &lt;a href="https://github.com/sonyahack1/VulnHub/blob/main/Thales_1/Thales_1___19.11.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/VulnHub/blob/main/Thales_1/Thales_1___19.11.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>VulnHub - ICA: 1 (Linux)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Tue, 04 Nov 2025 15:25:59 +0000</pubDate>
      <link>https://dev.to/sonyahack1/vulnhub-ica-1-linux-1me8</link>
      <guid>https://dev.to/sonyahack1/vulnhub-ica-1-linux-1me8</guid>
      <description>&lt;p&gt;🔥 Hi&lt;br&gt;
I just pwned a simple lab "&lt;strong&gt;ICA: 1&lt;/strong&gt;" on &lt;strong&gt;VulnHub&lt;/strong&gt;!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;T1595.002&lt;/strong&gt; - Active Scanning: Vulnerability Scanning&lt;br&gt;
&lt;strong&gt;T1190&lt;/strong&gt; - Exploit Public-Facing Application&lt;br&gt;
&lt;strong&gt;T1110.001&lt;/strong&gt; - Brute Force: Password Guessing&lt;br&gt;
&lt;strong&gt;T1059.004&lt;/strong&gt; - Command and Scripting Interpreter: Unix Shell&lt;br&gt;
&lt;strong&gt;T1548.001&lt;/strong&gt; - Abuse Elevation Control Mechanism: Setuid and Setgid&lt;/p&gt;

&lt;p&gt;Full writeup here:&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/sonyahack1/VulnHub/blob/main/ICA/ICA___03.11.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/VulnHub/blob/main/ICA/ICA___03.11.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>VulnHub - Hacksudo: Thor (Linux)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Wed, 08 Oct 2025 13:32:58 +0000</pubDate>
      <link>https://dev.to/sonyahack1/vulnhub-hacksudo-thor-linux-3c6c</link>
      <guid>https://dev.to/sonyahack1/vulnhub-hacksudo-thor-linux-3c6c</guid>
      <description>&lt;p&gt;🔥I just pwned "Hacksudo: Thor" on VulnHub! &lt;/p&gt;

&lt;p&gt;T1595 - Active Scanning&lt;br&gt;
T1190 - Exploit Public-Facing Application&lt;br&gt;
T1059 - Command and Scripting Interpreter&lt;br&gt;
T1548 - Abuse Elevation Control Mechanism&lt;/p&gt;

&lt;p&gt;Full writeup here:&lt;/p&gt;

&lt;p&gt;🔗&lt;a href="https://github.com/sonyahack1/VulnHub/blob/main/hacksudo_Thor/hacksudo_Thor___04.10.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/VulnHub/blob/main/hacksudo_Thor/hacksudo_Thor___04.10.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>"Escalate My Privileges: 1" - VulnHub (Easy)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Sun, 28 Sep 2025 17:35:23 +0000</pubDate>
      <link>https://dev.to/sonyahack1/escalate-my-privileges-1-vulnhub-easy-189d</link>
      <guid>https://dev.to/sonyahack1/escalate-my-privileges-1-vulnhub-easy-189d</guid>
      <description>&lt;p&gt;🔥 I just pwned "Escalate My Privileges: 1" on VulnHub!&lt;/p&gt;

&lt;p&gt;T1595 - Active Scanning&lt;br&gt;
T1190 - Exploit Public-Facing Application&lt;br&gt;
T1083 - File and Directory Discovery&lt;br&gt;
T1548 - Abuse Elevation Control Mechanism&lt;/p&gt;

&lt;p&gt;Full writeup here:&lt;/p&gt;

&lt;p&gt;🔗&lt;a href="https://github.com/sonyahack1/VulnHub/blob/main/Escalate_My_Privileges_1/Escalate_My_Privileges_1___27.09.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/VulnHub/blob/main/Escalate_My_Privileges_1/Escalate_My_Privileges_1___27.09.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>HTB - Vintage (Windows/Hard)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Sun, 14 Sep 2025 13:35:02 +0000</pubDate>
      <link>https://dev.to/sonyahack1/htb-vintage-windowshard-43no</link>
      <guid>https://dev.to/sonyahack1/htb-vintage-windowshard-43no</guid>
      <description>&lt;p&gt;I just pwned Vintage on Hack The Box! &lt;/p&gt;

&lt;p&gt;full writeup here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Vintage_Windows/HTB_Vintage_Windows_31.08.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Vintage_Windows/HTB_Vintage_Windows_31.08.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>HTB - Support - Windows (Easy)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Wed, 20 Aug 2025 15:55:13 +0000</pubDate>
      <link>https://dev.to/sonyahack1/htb-support-windows-easy-me6</link>
      <guid>https://dev.to/sonyahack1/htb-support-windows-easy-me6</guid>
      <description>&lt;p&gt;I just pwned Support on Hack The Box! &lt;/p&gt;

&lt;p&gt;1) TA0043 -&amp;gt; T1595 - Active Scanning&lt;br&gt;
2) TA0007 -&amp;gt; T1135 - Network Share Discovery&lt;br&gt;
3) TA0006 -&amp;gt; T1552 - Unsecured Credentials&lt;br&gt;
4) TA0007 -&amp;gt; T1087 - Account Discovery&lt;br&gt;
5) TA0006 -&amp;gt; T1552 - Unsecured Credentials&lt;br&gt;
6) TA0001 -&amp;gt; T1078 - Valid Accounts&lt;br&gt;
7) TA0004 -&amp;gt; T1098 - Account Manipulation&lt;br&gt;
8) TA0006 -&amp;gt; T1003 - OS Credential Dumping&lt;br&gt;
9) TA0008 -&amp;gt; T1021 - Remote Services&lt;/p&gt;

&lt;p&gt;Link to the writeup here:&lt;br&gt;
🔗 &lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Support_Windows/HTB_Support_Windows_10.08.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Support_Windows/HTB_Support_Windows_10.08.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
      <category>infosec</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>discuss</category>
    </item>
    <item>
      <title>HTB - Bastion (Windows)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Mon, 11 Aug 2025 16:12:28 +0000</pubDate>
      <link>https://dev.to/sonyahack1/htb-bastion-windows-34ie</link>
      <guid>https://dev.to/sonyahack1/htb-bastion-windows-34ie</guid>
      <description>&lt;p&gt;I just pwned Bastion on Hack The Box!&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;TA0043 -&amp;gt; T1595 - Active Scanning
TA0007 -&amp;gt; T1135 - Network Share Discovery
TA0006 -&amp;gt; T1003 - OS Credential Dumping
TA0001 -&amp;gt; T1078 - Valid Accounts
TA0006 -&amp;gt; T1552 - Unsecured Credentials
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Link to the writeup here:&lt;br&gt;
🔗 &lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Bastion_Windows/HTB_Bastion_Windows_01.08.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Bastion_Windows/HTB_Bastion_Windows_01.08.2025.md&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>infosec</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>HTB - Administrator (Windows AD)</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Tue, 05 Aug 2025 14:12:15 +0000</pubDate>
      <link>https://dev.to/sonyahack1/htb-administrator-windows-ad-2l40</link>
      <guid>https://dev.to/sonyahack1/htb-administrator-windows-ad-2l40</guid>
      <description>&lt;p&gt;We are exploiting a chain of misconfigured object permissions in Active Directory without BloodHound&lt;/p&gt;

&lt;p&gt;Techniques used:&lt;/p&gt;

&lt;p&gt;T1595.002&lt;br&gt;
T1069.002&lt;br&gt;
T1098&lt;br&gt;
T1078.002&lt;br&gt;
T1558.003&lt;br&gt;
T1003.006&lt;/p&gt;

&lt;p&gt;Link to the writeup here:&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Administrator_Windows/HTB_Administrator_Windows_12.06.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Administrator_Windows/HTB_Administrator_Windows_12.06.2025.md&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;it is very important for me to receive feedback on my completed work. If you have noticed an error, incorrect wording in my report or simply an incorrect train of thought - please let me know in the form of feedback so that I can improve my skills in preparing reports and make them more informative and useful&lt;/p&gt;

</description>
      <category>infosec</category>
      <category>security</category>
      <category>critique</category>
      <category>discuss</category>
    </item>
    <item>
      <title>HackTheBox - writeup of a Windows Machine - Cicada</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Wed, 30 Jul 2025 13:23:27 +0000</pubDate>
      <link>https://dev.to/sonyahack1/hackthebox-writeup-of-a-windows-machine-cicada-3hj1</link>
      <guid>https://dev.to/sonyahack1/hackthebox-writeup-of-a-windows-machine-cicada-3hj1</guid>
      <description>&lt;p&gt;🔥 Finished working on the writeup of a Windows machine on the HackTheBox platform - "Cicada" (Easy).&lt;/p&gt;

&lt;p&gt;Link to the writeup here:&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Cicada_Windows/HTB_Cicada_Windows_01.03.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Cicada_Windows/HTB_Cicada_Windows_01.03.2025.md&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It is very important for me to receive feedback on my completed work. If you have noticed an error, incorrect wording in my report or simply an incorrect train of thought - please let me know in the form of feedback so that I can improve my skills in preparing reports and&lt;br&gt;
make them more informative and useful.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>writeup on Linux machine Sau on HackTheBox platform</title>
      <dc:creator>Valera1</dc:creator>
      <pubDate>Sat, 19 Jul 2025 15:54:42 +0000</pubDate>
      <link>https://dev.to/sonyahack1/writeup-on-linux-machine-sau-on-hackthebox-platform-2md6</link>
      <guid>https://dev.to/sonyahack1/writeup-on-linux-machine-sau-on-hackthebox-platform-2md6</guid>
      <description>&lt;p&gt;Hi!&lt;/p&gt;

&lt;p&gt;🔥 Finished working on a writeup on an interesting, albeit simple, Linux machine on the HackTheBox platform — “Sau”.&lt;/p&gt;

&lt;p&gt;We exploit the "SSRF" vulnerability in the Request Basket service to gain access to the internal Maltrail IDS system. Then via "OS Command Injection" we gain access to the puma user for whom sudo rights are insecurely configured, which ultimately leads to a complete compromise of the system.&lt;/p&gt;

&lt;p&gt;In my writeup I described in detail how exactly "SSRF" and "Command Injection" work within this machine with step-by-step examples and explanations.&lt;/p&gt;

&lt;p&gt;Link to the writeup here:&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Sau_Linux/HTB_Sau_Linux_05.03.2025.md" rel="noopener noreferrer"&gt;https://github.com/sonyahack1/HackTheBox/blob/main/HTB_Sau_Linux/HTB_Sau_Linux_05.03.2025.md&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🚀 Friends, it is very important for me to receive feedback on my completed work. If you have noticed an error, incorrect wording in my report or simply an incorrect train of thought - please let me know in the form of feedback so that I can improve my skills in preparing reports and make them more informative and useful.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
