<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Stocker</title>
        <link>https://stream.echo6.co/videos/watch/e3efff35-ed9e-444a-b712-c549c28eff0b</link>
        <description>00:00 - Introduction 00:56 - Start of nmap 02:15 - Running Gobuster in VHOST Detection mode to find the dev subdomain 03:50 - Intercepting a request to dev.stocker.htb and seeing an connect.sid  cookie and x-powered-by header saying express, both indicating it uses NodeJS/Express 05:00 - Explaining why I'm trying these injections 07:00 - Bypassing login with mongodb injection by setting both username and password to not equals instead of equals 09:10 - Playing with the e-commerce store and seeing it gives us a PDF 10:45 - Using exiftool to see how the PDF was generated 12:05 - Inserting an HTML IFRAME when we purchase an item to see if the PDF Generated will include local files 17:00 - Extracting /var/www/dev/index.js and getting the mongodb password which lets us log into the server 19:50 - The order numbers don't appear to be that random, looking at the source code to identify how this is generated. It's just mongo's object ID which is heavily based upon time stamps 26:00 - Looking at sudo, we can perform a directory traversal to execute run any .js file as root 27:50 - Showing that you can now put regex in the Sudoers file which would fix this exploit</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:25:47 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Stocker</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/e3efff35-ed9e-444a-b712-c549c28eff0b</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=e3efff35-ed9e-444a-b712-c549c28eff0b" rel="self" type="application/rss+xml"/>
    </channel>
</rss>