<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HacktheBox - RouterSpace</title>
        <link>https://stream.echo6.co/videos/watch/d2c6e962-3422-4a54-8eed-4da947685f91</link>
        <description>00:00 - Intro 01:00 - Start of nmap 02:20 - Downloading the APK 03:30 - Running apktool to decode the APK, examining files, don't get much info 05:30 - Finding a certificate in the application that gives up the host name 07:00 - Trying out another APK Decompiler, Bytecode Viewer 10:15 - Start of setting up Genymotion 12:00 - Setting up the phone, accidentally choosing an ancient version which won't work 14:00 - Dragging the app to install it to the phone, get an error have to manually look at log file 14:40 - Setting up a newer phone so we can install the apk 16:00 - Installing the APK 16:40 - Configuring our phone to go through BurpSuite 18:15 - Changing burpsuite to listen on all hosts 19:00 - Showing the app is now going through burpsuite, adding the hostname to our host file 21:30 - Finding command injection in the communication between app and server, reverse shell fails 24:45 - Putting an SSH Key on the box 28:20 - Got a shell on the box digging through to figure out the SSH Server, finding something interesting but don't dig in 33:20 - Discovering the rules.v6 file for iptables likely isn't changed, discovering this is a way around the firewall block. 35:00 - Running LinPEAS but curling it over ipv6, http.server didn't listen, switching to netcat 40:00 - Running CVE-2021-3156, sudo baron samedit exploit 43:20 - Using IPv6 with our bash reverse shell</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:39:47 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HacktheBox - RouterSpace</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/d2c6e962-3422-4a54-8eed-4da947685f91</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=d2c6e962-3422-4a54-8eed-4da947685f91" rel="self" type="application/rss+xml"/>
    </channel>
</rss>