<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HackTheBox - Mailing</title>
        <link>https://stream.echo6.co/videos/watch/f9983df5-e701-47e5-b151-fbf116bf8d70</link>
        <description>00:00 - Introduction 01:00 - Start of nmap, discovering potential username convention from SSL Certificate 04:10 - Checking out the website 07:15 - Examining the request being made to download the PDF and talking about how Metadata can leak if it came from disk or the webapp 09:45 - Discovering File Disclosure in the download script 12:00 - Downloading the hMailServer configuration file, to get credentials 15:15 - Discovering the credentials work with SMTP 17:24 - Talking about the Moniker Link (CVE-2024-21413) vulnerability and sending a malicious document to Maya to get NTLM Hash 24:30 - Discovering what Maya can do, nothing interesting in the share but she can WinRM to the server 29:00 - Discovering LibreOffice 7.4.0.1 is being ran, exploiting it with CVE-2023-2255 to get a shell as admin</description>
        <lastBuildDate>Mon, 13 Apr 2026 13:14:51 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>HackTheBox - Mailing</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/f9983df5-e701-47e5-b151-fbf116bf8d70</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=f9983df5-e701-47e5-b151-fbf116bf8d70" rel="self" type="application/rss+xml"/>
    </channel>
</rss>