<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Sightless</title>
        <link>https://stream.echo6.co/videos/watch/3d77d12d-3bc8-487c-8c26-48f48b5c7f51</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 03:30 - Discovering SQLPad 06:20 - Discovering a SSRF in SQLPad when adding connections. Sending to FFUF, use a time filter to show timeouts 10:01 - Finding the SQLPad Version (6.10.0), which has a template injection vulnerability getting a shell 14:25 - Shell returned, extracting the SQLPad database 17:45 - Cracking the shadow file of the docker container to get michaels password 21:05 - Shell as Michael, discovering headless chrome is running forwarding ports to access it 26:55 - Logging into froxlor, getting RCE as root by changing PHP-FPM Configuration 32:40 - Doing the box the intended way, getting Froxlor Cookie via XSS 44:30 - Changing the Web1 users password so we can FTP Into the box 49:00 - Cracking the Keepass database to get root ssh key</description>
        <lastBuildDate>Mon, 13 Apr 2026 22:54:48 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Sightless</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/3d77d12d-3bc8-487c-8c26-48f48b5c7f51</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=3d77d12d-3bc8-487c-8c26-48f48b5c7f51" rel="self" type="application/rss+xml"/>
    </channel>
</rss>