<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Socket</title>
        <link>https://stream.echo6.co/videos/watch/e3bd2c9f-1410-47aa-8c1d-f237180ede6b</link>
        <description>00:00 - Introduction 01:00 - Start of nmap 01:45 - Taking a look at QReader.htb 04:40 - Opening the QReader application to discover it requires GLIBC_2.35, going back to nmap to see what flavor of linux was used 06:25 - Switching to Ubuntu Jammy and running Wireshark with the app running to see it makes a request to WS.QREADER.HTB 09:30 - Using BurpSuite to intercept this thick client by setting it up as a transparent proxy 12:00 - Playing with the websocket and discovering SQL Injection 14:40 - Using WebSocat and watch to build a quick client to test the SQL Injection over websockets and playing with Union to see how many columns are needed 16:00 - Identifying what database is used, using SQLITE_VERSION() and seeing it is SQLITE. Then dumping the schema of SQLITE 20:30 - Dumping the Users table 24:10 - Dumping the other tables, getting the name of the admin in the answers table 28:20 - Using username-anarchy to generate a bunch of potential usernames, then using CrackMapExec to spray ssh 29:30 - Logging into the webserver, looking at the webserver code and not really finding anything 32:00 - Looking at sudo rules to see I can run build-installer.sh, which is a wrapper around pyinstaller 34:50 - Looking at the PyInstaller spec file, to show we can include files in the executable that gets created by pyinstaller 35:30 - Including files owned by root such as ssh key, shadow and flag in the specfile for pyinstaller 39:30 - Using Pyinstxtractor to extract the pysinstaller exe and downloading our files 40:47 - Beyond Root: Decompiling the QReader Application with pycdc (Decompyle++)</description>
        <lastBuildDate>Mon, 13 Apr 2026 19:42:25 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Socket</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/e3bd2c9f-1410-47aa-8c1d-f237180ede6b</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=e3bd2c9f-1410-47aa-8c1d-f237180ede6b" rel="self" type="application/rss+xml"/>
    </channel>
</rss>