<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Compiled</title>
        <link>https://stream.echo6.co/videos/watch/4f2b7538-85cf-4530-8342-6dc7e4f80b76</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 03:20 - Entering our IP Address into the website and viewing the request within NC to see the useragent (git/2.45.0.windows.1) 06:50 - Going over CVE-2024-32002 which is a RCE within Git on case insensitive file systems 12:00 - Creating the malicious git project 21:15 - Our exploit didn't work, editing the post hook to be a base64 encoded powershell reverse shell 27:15 - Reverse shell returned downloading the Gitea database 31:00 - Looking at how gitea formats the PBKDF2 hash, converting it to a hashcat format 37:00 - Creating a python script to dump hashes from a gitea database in hashcat format 47:25 - Shell as Emily, discovering Visual Studio version 51:00 - Going over CVE-2024-20656 which is a privesc within Visual Studio 58:00 - Going over the code, editing it to send us a reverse shell 1:06:25 - Exploit didn't work, going back over the code and discovering it has the wrong path for visual studio</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:23:38 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Compiled</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/4f2b7538-85cf-4530-8342-6dc7e4f80b76</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=4f2b7538-85cf-4530-8342-6dc7e4f80b76" rel="self" type="application/rss+xml"/>
    </channel>
</rss>