<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - WifineticTwo</title>
        <link>https://stream.echo6.co/videos/watch/35182edd-6ae4-4bc9-a4f7-9692130098f0</link>
        <description>00:00 - Intro 01:00 - Start of nmap 02:54 - Discovering OpenPLC, looking for default credentials and logging in with openplc:openplc 05:10 - Uploading a C reverse shell to OpenPLC 08:20 - Talking about our shell hanging our webserver, showing a POC that runs system() to background a process which seems to be smart 09:55 - Discovering a Wireless NIC, running IW to see wireless networks and OneShot to attack WPS 12:30 - Joining the Wireless Network, showing how important it is to tell DHCLIENT to not update default routes 16:55 - Cheating to get a root shell, so we can show the routing table of the container that can no longer talk to us 19:20 - Adding unset new_routers to a DHCLIENT Enter Hook so it doesn't update routes 21:10 - Once we get on the Wireless Network we can SSH to OpenWRT and get the root flag 21:45 - Showing we could exploit OpenWRT through the web interface aswell, setting up a pivot with Chisel 23:20 - Logging into OpenWRT with a blank password, going to the Scheduled Tasks to create a cron 27:10 - Creating a Reverse Shell Payload with MSFVenom 29:20 - Getting multiple reverse shells so we can easily run multiple commands on the container</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:42:28 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - WifineticTwo</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/35182edd-6ae4-4bc9-a4f7-9692130098f0</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=35182edd-6ae4-4bc9-a4f7-9692130098f0" rel="self" type="application/rss+xml"/>
    </channel>
</rss>