<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Previse</title>
        <link>https://stream.echo6.co/videos/watch/8dc48228-5dd3-4721-a9e6-877520664fcf</link>
        <description>00:00 - Intro 01:00 - Start of nmap 02:00 - Running GoBuster, discovering the redirects have filesizes 03:00 - Showing the Execute After Read vulnerability (EAR) by using BurpSuite to hit / and discovering the page 04:00 - Using grep to show us only what we want (oP) 06:30 - Using BurpSuite to intercept the response to the request so we can disable the redirect (EAR). Then using the webform to create an account (IDOR) 08:00 - Examining the website source, using grep to look for places with user input 11:30 - Testing the logs.php page for shell injection, then getting a reverse shell 13:30 - Going into the webconfig to get database creds, then dump and crack creds 19:50 - Testing local users with the passwords from the database to get m4lwhere's creds 20:25 - Checking sudo to see something is weird, the env_reset/secure_path is not there. (this is configured in /etc/sudoers) 22:10 - Explaining Path Injection, then taking advantage of a script in sudo not using absolute paths 25:30 - Going back to explain things, weird behavior of the webserver always hanging. Maybe it was trying to send me a webshell? idk 28:00 - Fuzzing parameters of accounts.php to create accounts. But first discovering how important the Content-Type header is! 30:50 - Using WFUZZ to fuzz the confirmation  parameter 35:20 - Explaining how the EAR Vulnerability happened in the code and how to fix it</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:44:51 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Previse</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/8dc48228-5dd3-4721-a9e6-877520664fcf</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=8dc48228-5dd3-4721-a9e6-877520664fcf" rel="self" type="application/rss+xml"/>
    </channel>
</rss>