<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Pollution</title>
        <link>https://stream.echo6.co/videos/watch/0594f609-52bf-421d-9610-6f5fe1df42ce</link>
        <description>00:00 - Introduction 01:03 - Start of nmap 02:00 - Checking out the site, discovering an email (collect.htb) and setting up gobuster 06:00 - Discovering forum.collect.htb which is running MyBB, someone uploaded a Burp history file which contains API Information 09:30 - Manually examining the BurpSuite Backup File, and discovering it contains full HTTP Requests 12:12 - Sending a POST Request to /set/role/admin with the secret token 12:50 - The Admin Page has a separate registration forum, which sends an XML Request. Trying XXE and discovering Blind XXE 19:30 - Using my Blind XXE Script to make exfiltrating files quicker 23:20 - Trying to extract the Apache Configuration, getting the developers.collect.htb.conf file and then getting/cracking the htpasswd file 25:50 - Logging into developers.collect.htb, cannot login, going back to the Blind XXE getting source code and finding Redis Creds 28:50 - Enumerating Redis, seeing PHP Sessions, and changing our cookie to say we are an admin 36:50 - Using the PHP Filter Chain to get code execution on this include() which leads to a shell 44:20 - Looking at listening ports, seeing a few things on localhost. PHP FPM is listening on 9000, injecting code with fcgi.py into that and getting shell as Victor 52:45 - Grabbing the Pollution_API Source Code (listening on port 3000), then using Snyk to look for vulnerabilities 55:30 - Seeing where Lodash is used and talking about Prototype Pollution 59:30 - Logging into the API 1:02:00 - Our user is not an admin, logging into the MySQL Database and changing our role to admin 1:05:00 - Testing our ability to send messages 1:06:09 - Using Javscript Prototype pollution to set SHELL to a local file we created, which the exec() call uses and getting root. 1:07:00 - Doing this exploit without the need to drop a file by setting SHELL to /proc/self/exe</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:24:43 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Pollution</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/0594f609-52bf-421d-9610-6f5fe1df42ce</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=0594f609-52bf-421d-9610-6f5fe1df42ce" rel="self" type="application/rss+xml"/>
    </channel>
</rss>