<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Pikatwoo</title>
        <link>https://stream.echo6.co/videos/watch/29d310f0-444c-4832-880e-08acef24a42d</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 03:15 - Identifying all the technologies used in the box 10:45 - Looking at OpenStack Keystone Authentication and discovering CVE-2021-38155 12:15 - Pulling up API DOCS to see how to login to Keystone, then testing lockout 14:00 - Taking the Burpsuite Request, sending it to FFUF and using a trick to try each password multiple times 25:30 - Attempting to access Swift as a vendor to bypass auth, using GoBuster and discovering an Android directory with Pokatmon app in it 35:10 - Start of analyzing the Pokatmon App, examining DNS, setting up a MITM with Burpsuite and Socat 40:15 - Using Frida to disable TLS Certificate Pinning on Flutter 45:20 - Discovering the App Signs every request, grabbing the certificate out of the app, and signing our own request 49:20 - Performing an SQL Injection, getting an email address then looking for vulnerabilities in Forgot Password on the main website 58:48 - Discovering CVE-2021-43557 in APISIX, which gives us an idea to URLEncode Paths to bypass blacklists and gaining access to the /private/ directory which has a /forgot-password we can use to reset Roger's password 1:04:45 - Logging into the docs, gaining access to the API and finding an LFI 1:09:45 - Looking into CVE-2021-35368, which is a ModSecurity Bypass that allows us to abuse the LFI 1:18:10 - Using NGINX's temporary files with our PHP LFI to gain code execution 1:27:55 - Shell returned on Pokatdex-API, exporting Kubernetes secrets 1:34:20 - Discovering an APISIX admin key and exploiting this service by creating a route that executes code 1:59:20 - Shell returned on the APISIX box, discovering credentials we can SSH with 2:11:10 - Explioting the CRI-O with Kubernetes to set a kernel param to execute a script when a core dump is created (CVE-2022-0811)</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:41:14 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Pikatwoo</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/29d310f0-444c-4832-880e-08acef24a42d</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=29d310f0-444c-4832-880e-08acef24a42d" rel="self" type="application/rss+xml"/>
    </channel>
</rss>