<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - TwoMillion</title>
        <link>https://stream.echo6.co/videos/watch/bf917a57-0bcf-4f7a-9789-c0950fefaf02</link>
        <description>00:00 - Intro 00:18 - Start of nmap, scanning all ports with min-rate 02:35 - Browsing to the web page and taking a trip down memory lane with the HackTheBox v1 page 04:00 - Attempting to enumerate usernames 05:10 - Solving the HackTheBox Invite Code Challenge 05:50 - Sending the code to JS-Beautify 06:45 - Sending a curl request to /api/v1/invite/how/to/generate to see how to generate an invite code 10:40 - Creating an account and logging into the platform then identifying what we can do 16:50 - Discovering hitting /api/v1/ provides a list of API Routes, going over them and identifying any dangerous ones 17:50 - Attempting a mass assignment vulnerability upon logging in now that we know there is an is_admin flag 22:30 - Playing with the /api/v1/admin/settings/update route and discovering we can hit this as our user and change our role to admin 24:30 - Now that we are admin, playing with /api/v1/admin/vpn/generate and finding a command injection vulnerability 26:15 - Got a shell on the box, finding a password in an environment variable and attempting to crack the user passwords 30:00 - Re-using the database password to login as admin, discovering mail that hints at using a kernel privesc 32:00 - Searching for the OverlayFS Kernel Exploit 35:00 - Finding a proof of concept for CVE-2023-0386, seems sketchy but GCC is on the HTB Machine so i don't feel bad about running it 37:27 - Running the exploit and getting Root, finding an extra challenge thank_you.json, which is can be done pretty much in CyberChef 42:20 - Looking deeper at the invite code challenge to see if it was vulnerable to Type Juggling (it was back in the day but not anymore) 43:30 - Testing for command injection with a poisoned username 47:20 - Didn't work, looking at the source code and discovering it had sanitized usernames on the non-admin function</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:45:30 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - TwoMillion</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/bf917a57-0bcf-4f7a-9789-c0950fefaf02</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=bf917a57-0bcf-4f7a-9789-c0950fefaf02" rel="self" type="application/rss+xml"/>
    </channel>
</rss>