<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Alert</title>
        <link>https://stream.echo6.co/videos/watch/cdf7a2eb-c313-4d00-9759-b3d8a9e0a421</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 03:20 - Enumerating the Link_Share for Directory Traversal, coming up with nothing 05:10 - Discovering XSS in the Contact Us Form 07:30 - Playing with the XSS, we keep getting extra URL Encoded data turns out its not XSS but instead the admin is clicking links 10:50 - Sending only a link, discovering they click it. Now we need to find XSS in a page so manipulate their browser. Playing with the Markdown converter 13:45 - Creating an XSS Payload that will navigate to a page and send us the page and discovering a messages page 22:30 - The page shows us there is a messages.php file, showing other ways to see this. Then finding a file disclosure vulnerability 30:00 - Downloading the HTPASSWD from our File Disclosure vulnerability, then cracking it 34:14 - SSH into the box as Albert, looking for any databases we can exfil 37:55 - Discovering there is a PHP Webserver running as root in /opt/website-monitor and we can write files to the config. Dropping a php script to get root</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:43:32 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Alert</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/cdf7a2eb-c313-4d00-9759-b3d8a9e0a421</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=cdf7a2eb-c313-4d00-9759-b3d8a9e0a421" rel="self" type="application/rss+xml"/>
    </channel>
</rss>