<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - MagicGardens</title>
        <link>https://stream.echo6.co/videos/watch/6459eecd-7923-4d46-9ed2-fd7e86d3aef1</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 04:20 - Discovering the website is built with Django via Wappalyzer or the 404 page 07:40 - Looking at the Subscription Page, discovering we can change the hostname of the payment processor which is like a SSRF Vulnerability 11:30 - Making a request to the Payment Processor to see how it responds, building a flask app to mimic the behavior changing the denied message to approved 19:00 - Had some trouble on our first account, creating a second account to upgrade our subscription 21:30 - Manipulating the QR Code to add an XSS Payload to steal the cookie 32:10 - Getting Morty's password from the Django Admin panel and cracking it, then SSH into the box 35:50 - Looking at the Harvest Binary, opening it up in Ghidra, and dumping dangerous functions with a python script 40:10 - Cleaning up some functions in Ghidra 52:00 - Playing with the Buffer Overflow, doesn't seem to work with NC switching to python 1:02:30 - Writing an ssh key from the buffer overflow 1:06:40 - SSH as alex, looking at mail, cracking a zip and htpasswd file 1:12:10 - Using Docker Registry Grabber to download the docker file 1:16:30 - Looking at the Django source code, finding out it uses pickle serializer. Creating a malicious cookie 1:29:30 - Getting a shell by creating a malicious Django (version 4) cookie 1:34:00 - Abusing cap_sys_module in the docker container to load a kernel module as root and get a shell</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:51:02 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - MagicGardens</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/6459eecd-7923-4d46-9ed2-fd7e86d3aef1</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=6459eecd-7923-4d46-9ed2-fd7e86d3aef1" rel="self" type="application/rss+xml"/>
    </channel>
</rss>