<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Rope2</title>
        <link>https://stream.echo6.co/videos/watch/9a0c5632-d217-4aba-8c65-484b7e7d29b3</link>
        <description>00:00 - Intro 01:15 - Start of nmap 02:30 - Checking out the webpages, find Gitlab and Page about a custom chrome 03:25 - Viewing the Git log for the custom v8 javascript project and finding the vulnerability 06:00 - Finding an XSS in Contact Us 08:15 - Using the banners to find what version of Ubuntu the target is using 11:50 - Building v8 in Ubuntu 18.04 18:20 - Warning about needing 4 gigs of memory. 23:30 - Everything is compiled!  Start of the exploit, looking at some webpages that help out 24:30 - Starting v8 in gdb, then examining some memory structures 29:00 - Explaining Smi, Immediate Small Integer 30:00 - Starting our helper script with number conversions (float/bigint/hex) 34:10 - Doing DebugPrints on our float arrays to examine memory 38:40 - Digging into the memory to see where Map/Property/Elements/Length are in the memory 50:20 - Showing Objects in memory 58:15 - Precursor material to AddrOf and FakeObject, why type confusion leads to memory shenanigans 1:06:30 - Finding GetLastElement() behaves different on object arrays 1:17:00 - Doing Faiths AddrOf and troubleshooting why it doesn't work in ours 1:22:27 - Recoding the AddrOf, to start out with an array not object 1:26:45 - Explaining the FakeObj Primative 1:33:20 - Doing the Read Memory portion 1:37:50 - Coding the Write Memory function 1:40:40 - Using Web Assembly to create RWX 1:42:30 - Doing some memory analysis to find where our RWX location is 1:46:30 - Doing some memory analysis to find where the Backing Store address is 1:50:10 - Using MSFVenom to create some shellcode to touch a file 1:54:20 - Replacing the shellcode with a reverse shell! 1:56:30 - Testing on the custom chrome browser 1:58:30 - Running our exploit against the target!</description>
        <lastBuildDate>Fri, 17 Apr 2026 08:59:08 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Rope2</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/9a0c5632-d217-4aba-8c65-484b7e7d29b3</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=9a0c5632-d217-4aba-8c65-484b7e7d29b3" rel="self" type="application/rss+xml"/>
    </channel>
</rss>