<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>UHC - BackendTwo</title>
        <link>https://stream.echo6.co/videos/watch/d36d5fa6-a3ab-492e-a988-b6397c634a45</link>
        <description>00:00 - Intro 00:49 - Start of nmap 02:17 - Talking about why dirbusting an API is different. Bruteforce methods instead of extensions and 404 doesn't terminate recursion 03:10 - Installing the latest version of FeroxBuster 04:40 - Running FeroxBuster with Force Recursion and multiple HTTP methods to discover user endpoints 06:45 - Downloading all users, creating a single json file, then using JQ to enable us to filter users 10:08 - Registering an account via the Signup endpoint. Analyzing errors to identify how it wants data 11:55 - Logging into the application in order to get a bearer token 13:08 - Using BurpSuite to add the Bearer Token to our HTTP Request and accessing /docs/ 15:10 - Playing with the edit endpoint in the docs page 16:38 - Testing for Mass Assignment, by editing our profile but adding the is_superuser parameter 19:15 - Using the file endpoint to extract files from the application 20:45 - Creating a bash script to make extracting files easier for us 23:45 - Using the LFI to examine the /proc/ directory to get cmdline of pid and ppid, along with environment variables 26:35 - Examining the LFI Source Code to identify how the application works and JWT is created 30:50 - Trying to write files, discovering we need to edit our JWT 32:45 - Creating a bash script that will update the webserver code to include another endpoint to send a reverse shell 41:50 - Reverse shell returned, reviewing the logs to identify a password was entered as a username 44:00 - Trying to use Sudo and getting to PAM-Wordle 45:05 - Analyzing timestamps on the filesystem with find to identify a PAM Module that was manually placed on the file system (not put there by APT) 48:25 - Running strings on the PAM Module, discovering the wordlist used for wordle is in a user-readable directory 49:00 - Using the wordlist to cheat wordle and root the box 50:10 - Examining the source code of the box to identify why it is vulnerable to the Mass Assignment</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:59:47 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>UHC - BackendTwo</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/d36d5fa6-a3ab-492e-a988-b6397c634a45</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=d36d5fa6-a3ab-492e-a988-b6397c634a45" rel="self" type="application/rss+xml"/>
    </channel>
</rss>