<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - MonitorsThree</title>
        <link>https://stream.echo6.co/videos/watch/1a35e72e-c488-4631-92df-6d215f627fc1</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 04:20 - Examining Forgot Password to discover we can enumerate usernames and discover an SQL Error 05:04 - Showing why union injections aren't going to help us, then showing SQLMap 08:40 - Start of talking about error injection 11:20 - Dumping the database, table and column information from information_schema via errors caused by EXTRACTVALUE 21:50 - Logging into the website, not discovering anything really useful to us 22:30 - Testing our credentials against CACTI, which is version 1.2.26 and vulnerable to CVE-2024-25641 27:10 - Shell returned, dumping the cacti database to get more credentials 36:50 - Forwarding 8200 to us, and accessing duplicati's interface 39:00 - Discovering an auth bypass in duplicate when you have access to the database 44:50 - Backing up a crontab that has a reverse shell in it, then restoring it to the box and waiting for our shell to come</description>
        <lastBuildDate>Mon, 13 Apr 2026 22:50:58 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - MonitorsThree</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/1a35e72e-c488-4631-92df-6d215f627fc1</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=1a35e72e-c488-4631-92df-6d215f627fc1" rel="self" type="application/rss+xml"/>
    </channel>
</rss>