<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>(YT)IppSec</title>
        <link>https://stream.echo6.co/c/ippsec/videos</link>
        <description>Imported from YouTube: https://www.youtube.com/@ippsec</description>
        <lastBuildDate>Mon, 13 Apr 2026 12:58:46 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>(YT)IppSec</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/c/ippsec/videos</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/videos.xml?videoChannelId=16" rel="self" type="application/rss+xml"/>
        <podcast:txt purpose="p20url">https://stream.echo6.co/feeds/podcast/videos.xml?videoChannelId=16</podcast:txt>
        <item>
            <title><![CDATA[HackThebox - Eighteen]]></title>
            <link>https://stream.echo6.co/w/9MmRHiDVoP1Z9Hd4gF1aVZ</link>
            <guid>https://stream.echo6.co/w/9MmRHiDVoP1Z9Hd4gF1aVZ</guid>
            <pubDate>Sat, 11 Apr 2026 15:13:47 GMT</pubDate>
            <description><![CDATA[00:00 - Introduction 00:45 - Start of nmap 02:20 - Taking a look at the page, manually decoding the Flask Cookie 06:15 - Running NetExec with MSSQL Priv module which lets us know we can impersonate, switching to mssqlclient 09:30 - Impersonating a...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Introduction<br />
00:45 - Start of nmap<br />
02:20 - Taking a look at the page, manually decoding the Flask Cookie<br />
06:15 - Running NetExec with MSSQL Priv module which lets us know we can impersonate, switching to mssqlclient<br />
09:30 - Impersonating appdev, which can read the financial_planner table<br />
12:25 - Converting the PBKDF2 hash to the Django format so we can try to crack it<br />
16:20 - Using NXC to run RID BRUTE through MSSQL and get other users to spray the password with<br />
20:50 - Using Evil-WinRM to access the box as Adam.Scott then poke at the webserver files, nothing here<br />
22:45 - Getting the Windows Patch Level, noticing windows 2025 and searching exploits to find BadSuccessor<br />
30:00 - Setting up Chisel so we can tunnel back to our box to run the badsuccessor module with nxc<br />
32:50 - Looking at NXC Issues to see the support for BadSuccessor is still a PR, installing the special branch with uv<br />
39:15 - Setting our system time to the time on the webserver based upon the Date Header from Curl<br />
40:15 - Running BadSuccessor getting the NTLM hash of administrator and using psexec to get on the box</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="120204090" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/471e6ebd-70dd-4db6-9394-c0a9d96b020f?videoFileIds=20693"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/9MmRHiDVoP1Z9Hd4gF1aVZ"/>
            <media:player url="https://stream.echo6.co/w/9MmRHiDVoP1Z9Hd4gF1aVZ"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/51bb5562-2f8c-453c-8325-574e8b00aa50-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="120204090" url="https://stream.echo6.co/static/web-videos/2d362e3d-9904-4a4c-9dad-b66c197d07d8-1080.mp4" framerate="30" duration="2473" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/4c7f5027-3bda-4963-ad30-aa40b2974c6a.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/3f66c83e-26c0-4b95-9fa9-902be8e3683e.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackThebox - Eighteen</media:title>
            <media:description type="plain">00:00 - Introduction 00:45 - Start of nmap 02:20 - Taking a look at the page, manually decoding the Flask Cookie 06:15 - Running NetExec with MSSQL Priv module which lets us know we can impersonate, switching to mssqlclient 09:30 - Impersonating a...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - DarkZero]]></title>
            <link>https://stream.echo6.co/w/u9jyLZdPv24xKLieojxb1L</link>
            <guid>https://stream.echo6.co/w/u9jyLZdPv24xKLieojxb1L</guid>
            <pubDate>Sat, 04 Apr 2026 15:31:36 GMT</pubDate>
            <description><![CDATA[00:00 - Introduction 01:00 - Start of nmap, mention VMRDP (2179), not important but just interesting 04:00 - Running NetExec to test the Assume Breach credentials and seeing we can connect to MSSQL 05:30 - Using MSSQL.PY to login, then using XP_DI...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Introduction<br />
01:00 - Start of nmap, mention VMRDP (2179), not important but just interesting<br />
04:00 - Running NetExec to test the Assume Breach credentials and seeing we can connect to MSSQL<br />
05:30 - Using <a href="http://MSSQL.PY" target="_blank" rel="noopener noreferrer">MSSQL.PY</a> to login, then using XP_DIRTREE to see the box connects back to us with a machien account, can't crack this<br />
06:55 - Running enum_links, seeing a second MSSQL Server (DC02.darkzero.ext), switching to it and then noticing we are DBO, enable + run XP_CMDSHELL<br />
12:30 - Shell returned on HyperV Machine, showing how to identify patch level on Windows with HKLM:\SOFTWARE\Microsoft\Windows\ NT\CurrentVersion, discover it hasn't been patched since 2024<br />
14:20 - Loading up Meterpreter and Metasploit to use local_exploit_suggester and then exploit CVE-2024-30088 to get admin on this VM (privesc method #1)<br />
20:00 - Enumerating Domains to show we can abuse TGT Delegation to pivot to the adjacent domain<br />
24:30 - Looking at Rusthound/Bloodhound (another good way to enumerate the domains)<br />
29:30 - Explaining the TGT Delegation we will abuse and why we can't just golden ticket (sid filter), get DARKZERO.HTB to connect to DARKZERO.EXT, then replay KRB Ticket<br />
34:50 - Using Meterpreter to run Rubeus, which will get us that ticket<br />
38:45 - Grabbing the DC01 Ticket, then using it to connect to DARKZERO.HTB and getting admin<br />
46:30 - Showing PRIVESC Method #2, NTLMRelay with remove-mic-partial. Works on all domains missing June 2025 patch to go from Domain User to Admin<br />
1:03:40 - Showing the June 2025 patch does fix the weird bug where we can duplicate DNS Names with the 1UWhRC... thing appended<br />
1:10:30 - Showing Privesc Method #3 (recovering the original token of our session, so we can get SeImpersonate after the MSSQL Shell<br />
1:23:00 - Privesc Method #4, the intended way. If we can get (or reset) the password to MSSQL its allowed to login as a service, which gives us SeImpersonate</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="265302084" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/e3e94616-ec5f-4319-a8a5-321db508470c?videoFileIds=19154"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/u9jyLZdPv24xKLieojxb1L"/>
            <media:player url="https://stream.echo6.co/w/u9jyLZdPv24xKLieojxb1L"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/6440c3b4-8056-4f98-abd3-f1f88fcd1e49-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="265302084" url="https://stream.echo6.co/static/web-videos/8f382267-050c-4f38-993e-d7d9f7f8d41d-1080.mp4" framerate="30" duration="5777" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/9c20369f-46e7-4d9b-895f-e19489a0e670.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/3086c8e5-665c-4639-a5af-1124bca80c0a.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - DarkZero</media:title>
            <media:description type="plain">00:00 - Introduction 01:00 - Start of nmap, mention VMRDP (2179), not important but just interesting 04:00 - Running NetExec to test the Assume Breach credentials and seeing we can connect to MSSQL 05:30 - Using MSSQL.PY to login, then using XP_DI...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - OpenKeyS]]></title>
            <link>https://stream.echo6.co/w/ksV9Qxrwd4eqFvfFYgmWLv</link>
            <guid>https://stream.echo6.co/w/ksV9Qxrwd4eqFvfFYgmWLv</guid>
            <pubDate>Sun, 29 Mar 2026 09:32:01 GMT</pubDate>
            <description><![CDATA[00:00 - Introduction 00:31 - Begin of nmap 01:10 - Nmap shows it is BSD, going over some command differences 02:00 - Running GoBuster to find other PHP Scripts 04:30 - Looking at the includes directory and finding source code 10:14 - Reversing the...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Introduction<br />
00:31 - Begin of nmap<br />
01:10 - Nmap shows it is BSD, going over some command differences<br />
02:00 - Running GoBuster to find other PHP Scripts<br />
04:30 - Looking at the includes directory and finding source code<br />
10:14 - Reversing the Check_Auth binary with Ghidra, to see it doesn't decompile well<br />
12:00 - Using VirusTotal to find out if this an old binary<br />
13:20 - Using Cutter to decompile this binary, to see it does a better job than Ghidra!<br />
17:50 - Finding some BSD Exploits related to authentication<br />
20:00 - Putting SCHALLENGE as the username, causes a different error message. Then doing some code analysis around $_REQUEST<br />
24:50 - Abusing the $_REQUEST() feature to overwrite the username file with a valid user and grab their SSH Key<br />
26:10 - Showing how OpenBSD has some different command line switches<br />
31:00 - Going back to the earlier CVE, since it showed a privesc aswell and explaining CVE-2019-19520<br />
40:45 - EXTRA: Looking at the PHP Code to explain the $_REQUEST exploit again</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="169416477" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/9d9fba96-f721-42f1-bde6-62fc74624b7d?videoFileIds=17680"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/ksV9Qxrwd4eqFvfFYgmWLv"/>
            <media:player url="https://stream.echo6.co/w/ksV9Qxrwd4eqFvfFYgmWLv"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/088e800f-3d97-45fd-9fbb-3d8428796724-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="169416477" url="https://stream.echo6.co/static/web-videos/8131fb09-9418-49ac-9339-3db3404eb1da-1080.mp4" framerate="60" duration="2904" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/8688a333-aed7-40ae-bcb5-c0fa733913a5.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/4f2af774-7d0f-426e-b562-74da7c92bebd.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - OpenKeyS</media:title>
            <media:description type="plain">00:00 - Introduction 00:31 - Begin of nmap 01:10 - Nmap shows it is BSD, going over some command differences 02:00 - Running GoBuster to find other PHP Scripts 04:30 - Looking at the includes directory and finding source code 10:14 - Reversing the...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Academy Intro]]></title>
            <link>https://stream.echo6.co/w/t4AYzSVMprYGRzi43NB6qm</link>
            <guid>https://stream.echo6.co/w/t4AYzSVMprYGRzi43NB6qm</guid>
            <pubDate>Sun, 29 Mar 2026 09:31:44 GMT</pubDate>
            <description><![CDATA[Academy URL: https://academy.hackthebox.eu 00:00 - Intro 01:03 - Accessing Academy 01:45 - Talking about Paths 02:10 - Talking about what a Cube is 03:25 - Showing all the modules and tiers 06:30 - Starting the Intro to Academy Course 08:20 - Sho...]]></description>
            <content:encoded><![CDATA[<p>Academy URL: <a href="https://academy.hackthebox.eu" target="_blank" rel="noopener noreferrer">https://academy.hackthebox.eu</a></p>
<p>00:00 - Intro<br />
01:03 - Accessing Academy<br />
01:45 - Talking about Paths<br />
02:10 - Talking about what a Cube is<br />
03:25 - Showing all the modules and tiers<br />
06:30 - Starting the Intro to Academy Course<br />
08:20 - Showcasing interactive modules by starting a pwnbox instance<br />
10:30 - Spawning a lab to interact with</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="65155145" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/db278793-f97c-426e-b844-d3d17dbfef10?videoFileIds=17679"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/t4AYzSVMprYGRzi43NB6qm"/>
            <media:player url="https://stream.echo6.co/w/t4AYzSVMprYGRzi43NB6qm"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/d6787829-2d27-49b8-ba17-46e3af227505-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="65155145" url="https://stream.echo6.co/static/web-videos/c197d971-f372-4c31-b2a0-1a238f98464f-1080.mp4" framerate="60" duration="767" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/d16899e1-3366-461d-87ff-4d49ce6d68a2.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/efd17e5c-91e6-40a0-916b-750b45da67e4.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Academy Intro</media:title>
            <media:description type="plain">Academy URL: https://academy.hackthebox.eu 00:00 - Intro 01:03 - Accessing Academy 01:45 - Talking about Paths 02:10 - Talking about what a Cube is 03:25 - Showing all the modules and tiers 06:30 - Starting the Intro to Academy Course 08:20 - Sho...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - SneakyMailer]]></title>
            <link>https://stream.echo6.co/w/rJQPcM1TMDR9wJRLnKVug3</link>
            <guid>https://stream.echo6.co/w/rJQPcM1TMDR9wJRLnKVug3</guid>
            <pubDate>Sun, 29 Mar 2026 09:31:27 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 00:45 - Start of nmap 03:10 - Poking a the websites 04:20 - Starting gobusters in the background while we look at the site 07:00 - Grabbing a list of emails off of the website 08:40 - Using SWAKS to mass email users with a link 14:45...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
00:45 - Start of nmap<br />
03:10 - Poking a the websites<br />
04:20 - Starting gobusters in the background while we look at the site<br />
07:00 - Grabbing a list of emails off of the website<br />
08:40 - Using SWAKS to mass email users with a link<br />
14:45 - User went to our website, grabbed credentials<br />
17:50 - Failing to do FTP User Enumeration, do this at the end of the video<br />
19:00 - Failing with Thunderbird to login<br />
22:30 - Switching to the Evolution Mail client to check mailboxes, finding FTP Details in Sent Mail<br />
28:40 - Using wget to mirror the FTP Directory, then poking at PHP Files<br />
30:50 - Showing pypi/Register.php, which <em>should</em> have been used during the phishing stage<br />
31:30 - Checking if we can upload files to the FTP Directory and finding the dev VHOST<br />
35:00 - Shell Returned<br />
37:00 - Discovering a HTPASSWD file, then cracking it with hashcat<br />
39:50 - Checking out pypi.sneakycorp.htb:8080 and finding a pypi server<br />
41:00 - Creating a Malicious PyPi Package<br />
43:30 - Adding a reverse shell to our pypi package<br />
44:45 - Creating a pypi configuration file<br />
47:00 - Uploading the package and getting a shell as low<br />
50:10 - Checking sudoers, and finding low can run pip3 - Use GTFO Bin to get root<br />
53:30 - EXTRA: Enumerating the FTP Users by creating a quick webapp then using FFUF against it.</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="271086206" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/d06fc995-b918-40a3-b20d-e45afaab98f0?videoFileIds=17678"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/rJQPcM1TMDR9wJRLnKVug3"/>
            <media:player url="https://stream.echo6.co/w/rJQPcM1TMDR9wJRLnKVug3"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/103ef535-7235-480a-99b1-ea37da2b62b6-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="271086206" url="https://stream.echo6.co/static/web-videos/412cb686-7988-4256-816f-331dbd536400-1080.mp4" framerate="60" duration="4051" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/343d0522-1980-4ac0-a9a3-bc69faa4e765.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/9d8f818e-e7a1-4256-b6e9-4c7e9e269343.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - SneakyMailer</media:title>
            <media:description type="plain">00:00 - Intro 00:45 - Start of nmap 03:10 - Poking a the websites 04:20 - Starting gobusters in the background while we look at the site 07:00 - Grabbing a list of emails off of the website 08:40 - Using SWAKS to mass email users with a link 14:45...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Unbalanced]]></title>
            <link>https://stream.echo6.co/w/boRmre5LmJM4vmDFrSneST</link>
            <guid>https://stream.echo6.co/w/boRmre5LmJM4vmDFrSneST</guid>
            <pubDate>Sun, 29 Mar 2026 09:31:00 GMT</pubDate>
            <description><![CDATA[00:00 - Introduction 01:03 - Start of nmap 02:27 - Setting Squid up to do a portscan while we work on something else 07:00 - Poking at RSYNC and seeing we can download encrypted config backups 09:40 - Examining files downloaded from RSYNC, specifi...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Introduction<br />
01:03 - Start of nmap<br />
02:27 - Setting Squid up to do a portscan while we work on something else<br />
07:00 - Poking at RSYNC and seeing we can download encrypted config backups<br />
09:40 - Examining files downloaded from RSYNC, specifically looking at entropy to validate encryption<br />
14:30 - Finding the EncFS Config file, and then using John to Crack it<br />
18:15 - Decrypting the config directory and finding a squid password and some hostnames<br />
22:30 - Examining the new website exposed to us, configuring BurpSuite to use the squid proxy<br />
24:00 - Showing the Intranet-Host header is changing, then accessing Squid Cache Manager to find some more ip addresses<br />
26:15 - Using curl to view Squid Cache Information<br />
28:25 - Finding a new IP Address for a decomissioned server.  Looks like this one has a vulnerability<br />
32:15 - Poking at the login form on the intranet-host1, looks like its vulnerable to SQL Injection<br />
37:30 - Trying SQL Injection in the Password Field since the User was behaving weirdly.. Password behaving slightly differently<br />
38:20 - Examining what XPATH Injection is<br />
39:15 - Confirming it is XPATH Injection by using standard XPATH Payloads<br />
44:10 - Using a XPATH Payload to extract the password length for a user<br />
46:00 - Using XPATH Injection to bruteforce the password one character at a time<br />
48:40 - Using Python to Automate the XPATH Injection to dump passwords<br />
1:01:30 - Script near done, grabbing the password for all users<br />
1:06:40 - Using Hydra to find one of the users had SSH Access<br />
1:08:30 - Reading the TODO and finding pi-hole by checking arp with ip neigh<br />
1:10:10 - Creating an SSH Port Forward to access Pi-Hole<br />
1:13:55 - Finding Pi-Hole Exploits<br />
1:15:00 - Using FFUF to bruteforce the Pi Hole login form<br />
1:17:50 - Failing to use public exploits for this<br />
1:19:45 - Finding a blog post to examine how this exploit works<br />
1:21:45 - Using CyberChef to edit the payload for our Pi Hole exploit<br />
1:23:55 - Manually sending the exploit and getting a shell<br />
1:25:00 - Finding the root password in a config file, then using SU to get root</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="271064566" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/542c29fb-5a66-4343-b26f-2f6892c637a3?videoFileIds=17677"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/boRmre5LmJM4vmDFrSneST"/>
            <media:player url="https://stream.echo6.co/w/boRmre5LmJM4vmDFrSneST"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/b9e3d634-93a2-444d-b15b-11cbb20d46c2-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="271064566" url="https://stream.echo6.co/static/web-videos/29558eb4-8ba4-4651-9082-723f9d3a5a88-1080.mp4" framerate="60" duration="5183" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/9e0f69d2-464e-4570-9aa2-f1d61aee0ed3.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/1d9266ca-9045-4d40-b7ab-6015ec88309c.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Unbalanced</media:title>
            <media:description type="plain">00:00 - Introduction 01:03 - Start of nmap 02:27 - Setting Squid up to do a portscan while we work on something else 07:00 - Poking at RSYNC and seeing we can download encrypted config backups 09:40 - Examining files downloaded from RSYNC, specifi...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Worker]]></title>
            <link>https://stream.echo6.co/w/rEjemmALyvuMTLR98KeC5B</link>
            <guid>https://stream.echo6.co/w/rEjemmALyvuMTLR98KeC5B</guid>
            <pubDate>Sun, 29 Mar 2026 09:30:33 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:05 - Start of nmap 02:50 - Checkign out the open SVN Port 03:45 - Adding the discovered domains to /etc/hosts and checking out the websites 05:30 - Some grep magic to show only what we want, which is URLS 09:15 - Using GoBuster to...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:05 - Start of nmap<br />
02:50 - Checkign out the open SVN Port<br />
03:45 - Adding the discovered domains to /etc/hosts and checking out the websites<br />
05:30 - Some grep magic to show only what we want, which is URLS<br />
09:15 - Using GoBuster to see if there are any more more VHOSTS<br />
11:00 - Checking out the SVN and seeing creds in a previous revision (commit)<br />
13:00 - Logging into Azure Devops (devops.worker.htb) and discovering the pipelin to deploy master branch to a server<br />
15:00 - Pushing our webshell to the git master branch and getting shell on the box<br />
16:10 - Choosing the revshell out of the tennc github page<br />
21:40 - Creating a powershell one liner to get a reverse shell via Nishang<br />
24:30 - Discovering SVN Credentials and using CrackMapExec to find valid passwords<br />
28:50 - CrackMapExec was giving me issues, installing it from source with Poetry<br />
30:00 - Using CrackMapExec to test a list of credentials without bruteforcing all passwords to all users<br />
32:10 - Using WinRM to get a shell as Robisl<br />
35:10 - Logging into Azure Devops as Robisl and discovering we can edit the build pipeline<br />
39:45 - Copying our reverse shell to the box, so we can easily execute it from the build pipeline and getting admin<br />
41:30 - UNINTENDED: Doing the box via RoguePotato<br />
42:50 - Poorly explaining why we need to use chisel<br />
45:50 - Running Chisel to setup a reverse port forward between the target and our box<br />
52:15 - Setting up SoCAT to go through our tunnel<br />
52:50 - Executing RoguePotato to get an admin shell<br />
53:30 - Explaining the tunneling again in MSPaint. Hope this helps.<br />
1:01:40 - Doing RoguePotato without socat, just a single Chisel tunnel</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="248737460" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/cfcdf6ea-4edb-4157-b1e6-bb3c34fae9b3?videoFileIds=17676"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/rEjemmALyvuMTLR98KeC5B"/>
            <media:player url="https://stream.echo6.co/w/rEjemmALyvuMTLR98KeC5B"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/9267e1d8-4f65-4252-ac21-7f43cee17471-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="248737460" url="https://stream.echo6.co/static/web-videos/a328e207-3a38-42d4-9b25-97c29dd4d800-1080.mp4" framerate="60" duration="3917" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/629db29f-4967-47cc-a3ec-10f3643da544.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/ef8ff342-ab36-4080-bfe5-496a611dbc8e.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Worker</media:title>
            <media:description type="plain">00:00 - Intro 01:05 - Start of nmap 02:50 - Checkign out the open SVN Port 03:45 - Adding the discovered domains to /etc/hosts and checking out the websites 05:30 - Some grep magic to show only what we want, which is URLS 09:15 - Using GoBuster to...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Armageddon]]></title>
            <link>https://stream.echo6.co/w/wEg8DMFoWgydVxTxVXtM8B</link>
            <guid>https://stream.echo6.co/w/wEg8DMFoWgydVxTxVXtM8B</guid>
            <pubDate>Sun, 29 Mar 2026 09:30:08 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 00:50 - Start of the box, showing a quick way to nmap 02:15 - Looking at web page 03:00 - Looking for Drupal Scanners 04:00 - Showing how I would fingerprint opensource apps if there was no scanner 06:30 - Using DroopeScan to scan th...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
00:50 - Start of the box, showing a quick way to nmap<br />
02:15 - Looking at web page<br />
03:00 - Looking for Drupal Scanners<br />
04:00 - Showing how I would fingerprint opensource apps if there was no scanner<br />
06:30 - Using DroopeScan to scan the site<br />
07:50 - Starting to use Drupalgeddon2 to get a shell<br />
11:40 - Installing gems so DrupalGeddon works<br />
12:15 - Drupalgeddon2 works, going from a webshell to reverse shell<br />
16:00 - Confused about OSError: out of pty devices when improving the shell, give up eventually<br />
17:50 - Looking for users on the box, then hunting for the Drupal configuration<br />
21:00 - Cannot find the drupal configuration, going to google and asking for how to change the SQL Password<br />
22:45 - Logging into the Drupal MySQL Database then dumping the Drupal Hash but have trouble getting it to work since we don't have a TTY<br />
29:00 - Cracking the Joomla Password, then testing the password with ssh and logging in<br />
30:00 - Our user can install Snap Packages with sudo, so building a malicious snap<br />
31:20 - Installing FPM which lets us build packages, building a lot of bad packages until we find one that works<br />
36:20 - Our malicious packages aren't working, switching to a non-malicious one to test the exploit<br />
40:16 - Having our snap attempt to grab the root flag, turns out i was just impatient before<br />
43:43 - Moving bash to avoid system directories and setting it to setuid<br />
45:10 - Explaining what snap is</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="186577585" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/f849bf99-a700-4b54-96f7-9a577521b615?videoFileIds=17675"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/wEg8DMFoWgydVxTxVXtM8B"/>
            <media:player url="https://stream.echo6.co/w/wEg8DMFoWgydVxTxVXtM8B"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/f5d55a76-3399-4a55-93a5-b974d1dc60ed-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="186577585" url="https://stream.echo6.co/static/web-videos/ee5e84a3-f61c-463b-966b-28029837cd80-1080.mp4" framerate="60" duration="2838" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/9f5d6c1f-e469-4112-bf60-f4b7f98e7cf8.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/f4cd95af-93f1-4b00-81ed-286177883c8f.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Armageddon</media:title>
            <media:description type="plain">00:00 - Intro 00:50 - Start of the box, showing a quick way to nmap 02:15 - Looking at web page 03:00 - Looking for Drupal Scanners 04:00 - Showing how I would fingerprint opensource apps if there was no scanner 06:30 - Using DroopeScan to scan th...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Cereal]]></title>
            <link>https://stream.echo6.co/w/vPR3THfHGQ2Uahqc3na5LW</link>
            <guid>https://stream.echo6.co/w/vPR3THfHGQ2Uahqc3na5LW</guid>
            <pubDate>Sun, 29 Mar 2026 09:29:43 GMT</pubDate>
            <description><![CDATA[01:17 - Start of nmap, showing having valid hostnames will give more information 03:54 - Error message on source.cereal.htb leaks a path 06:30 - Showing .git doesn't exist in DirectyList but does in Raft 08:02 - Using Git-Dumper to download the .g...]]></description>
            <content:encoded><![CDATA[<p>01:17 - Start of nmap, showing having valid hostnames will give more information<br />
03:54 - Error message on source.cereal.htb leaks a path<br />
06:30 - Showing .git doesn't exist in DirectyList but does in Raft<br />
08:02 - Using Git-Dumper to download the .git directory and view the source<br />
09:30 - Looking at Git History shows where deserialization happens and a hard coded JWT<br />
12:08 - Using the hard coded JWT To build our own token in dotnet.<br />
21:00 - Trying to use our JWT to access authenticated pages<br />
25:42 - Going through the React JavaScript to see the token is stored in our browsers local storage<br />
29:40 - Our browser keeps clearing the storage lets just intercept a request in BurpSuite and do what we need<br />
32:15 - Start of the Desrialization, BadWords Filter to prevent ySoSerial, but we can manually create our own deserialization payload<br />
33:20 - Finding the name of our JSON Library then finding a blackhat talk on abusing it, to build our payload<br />
40:11 - More examining javascript to find routes that leaks pages of the pplication<br />
42:15 - Using npm audit to find an XSS Vulnerability on /admin due to an out of date plugin react-marked-markdown<br />
46:10 - Testing the XSS Vulnerability with a simple payload<br />
49:00 - Putting it all togather, writing notes on how we are going to build the exploit<br />
51:15 - Start of exploit script making python requests not care about SSL, then building our JWT with pyJwt<br />
57:00 - Testing out bad character evasion with Base64 by using a benign XSS Payload first<br />
1:06:20 - Adding stage 1 to our script to send the deserialization payload<br />
1:08:22 - Changing our payload to use XMLHttpRequest to force the browser to make a request to perform the deserialization which bypasses the RestrictIP Policy<br />
1:13:08 - Our script did not work, troubleshooting it<br />
1:17:57 - Script worked, lets now host a ASPX File for it to download<br />
1:19:20 - Using our webshell to download the SQLite Database<br />
1:22:45 - Our Powershell One-Liner to convert the database to b64 just fails.  Lets copy the database to the web directory so we can download it without encoding it<br />
1:25:00 - Showing IIS isn't allowing us to download files that end in .db<br />
1:27:45 - Showing odd behavior with SSH not prompting us for password due to it treating PubKey as login attempts.  Fix is tell SSH to not us pubkey<br />
1:33:00 - Discovering port 8080, forwarding that port and discovering GraphQL. Installing GraphQL Playground<br />
1:37:20 - Using GraphQL Playground to dump data out of the database, then use a mutation to trigger the SSRF<br />
1:39:30 - Downloading GenericPotato so we can use this SSRF to steal the Token<br />
1:44:20 - Running Generic Potato in HTTP Mode triggering the SSRF and getting a root shell</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="331222565" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/f18734d5-19fd-4408-b5a7-29efb9005a76?videoFileIds=17674"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/vPR3THfHGQ2Uahqc3na5LW"/>
            <media:player url="https://stream.echo6.co/w/vPR3THfHGQ2Uahqc3na5LW"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/28951a8f-4907-42c1-91ce-3afc14d4bb22-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="331222565" url="https://stream.echo6.co/static/web-videos/8777492e-9a67-440e-9229-c16c7437a7ea-1080.mp4" framerate="60" duration="6415" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/18b2c37a-bc2e-419f-8aa3-90884c01ee9b.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/7fcbcfff-5953-4835-b800-e217b73777b8.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Cereal</media:title>
            <media:description type="plain">01:17 - Start of nmap, showing having valid hostnames will give more information 03:54 - Error message on source.cereal.htb leaks a path 06:30 - Showing .git doesn't exist in DirectyList but does in Raft 08:02 - Using Git-Dumper to download the .g...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Intense]]></title>
            <link>https://stream.echo6.co/w/s5CJiUHiUrzsvuLMD25VX5</link>
            <guid>https://stream.echo6.co/w/s5CJiUHiUrzsvuLMD25VX5</guid>
            <pubDate>Sun, 29 Mar 2026 09:28:40 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:15 - Begin of nmap 03:30 - Examining the Message, pointing out the endpoint does not need authentication 06:15 - Using FFUF to fuzz the API End Point and show importence of Content-Type 12:00 - Starting SQLMAP then manually fuzzin...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:15 - Begin of nmap<br />
03:30 - Examining the Message, pointing out the endpoint does not need authentication<br />
06:15 - Using FFUF to fuzz the API End Point and show importence of Content-Type<br />
12:00 - Starting SQLMAP then manually fuzzing this application<br />
14:30 - SQLite Boolean Injection, with CASE IF/THEN/ERROR<br />
20:00 - SQLite Boolean Injection, Enumerating Usernames<br />
24:00 - SQLite Boolean Injection, Start of Dumping Password<br />
26:10 - SQLite Boolean Injeciton, Optimization chat about UNICODE and SUBSTR<br />
29:40 - Start of coding out python script to dump the hash<br />
41:20 - This hash looks weird... Tons of troubleshooting<br />
45:12 - Explaining the issue, we are hitting the 140 character limit... Switching script up to do SUBSTR<br />
51:55 - Script completed to dump hashes.<br />
53:15 - Static source code analysis, find its vulnerable to Hash Length Extension Attack<br />
59:50 - Using HashPumpy to perform the Hash Length Extension Attack<br />
1:11:30 - We base64'd the signing portion wrong<br />
1:13:30 - Now we have access to /admin, can use its API to read files and directories, showing Sched_debug and /proc/net/tcp,udp,environ to get important information<br />
1:23:30 - Finding a RW SNMP Community string and then using snmp-shell to get code execution<br />
1:29:00 - Generating a SSH Key then copying it slowly to the box<br />
1:35:00 - Doing a Local Port Forward with the Debian-SNMP User<br />
1:37:20 - Binary Exploitation with Note_Server: Going over Source and recompiling with ggdb flag<br />
1:41:00 - Binary Exploitation: Setting up PwnTools so we can interact with the binary<br />
1:46:40 - Binary Exploitation: Defeating ASLR by leaking an address<br />
1:56:20 - Binary Exploitation: Leaking LibC and Getting Code Execution<br />
2:05:30 - Binary Exploitation: Creating offset's for our remote server to get it working</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="561143523" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/d333372f-e6f8-4e18-83de-57235c262ffe?videoFileIds=17673"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/s5CJiUHiUrzsvuLMD25VX5"/>
            <media:player url="https://stream.echo6.co/w/s5CJiUHiUrzsvuLMD25VX5"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/c241c742-1719-4cb4-9d30-3fbec346f801-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="561143523" url="https://stream.echo6.co/static/web-videos/4ff7cf48-3098-437e-810e-6649cc1dc981-1080.mp4" framerate="60" duration="8098" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/dfa7bdc0-796b-4dae-9f30-c8b053674324.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/647946a6-6196-44ac-abd9-1d6616fedf33.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Intense</media:title>
            <media:description type="plain">00:00 - Intro 01:15 - Begin of nmap 03:30 - Examining the Message, pointing out the endpoint does not need authentication 06:15 - Using FFUF to fuzz the API End Point and show importence of Content-Type 12:00 - Starting SQLMAP then manually fuzzin...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Rope2]]></title>
            <link>https://stream.echo6.co/w/k2iMkS6boM5xht9Vs8qxP2</link>
            <guid>https://stream.echo6.co/w/k2iMkS6boM5xht9Vs8qxP2</guid>
            <pubDate>Sun, 29 Mar 2026 09:27:24 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:15 - Start of nmap 02:30 - Checking out the webpages, find Gitlab and Page about a custom chrome 03:25 - Viewing the Git log for the custom v8 javascript project and finding the vulnerability 06:00 - Finding an XSS in Contact Us 0...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:15 - Start of nmap<br />
02:30 - Checking out the webpages, find Gitlab and Page about a custom chrome<br />
03:25 - Viewing the Git log for the custom v8 javascript project and finding the vulnerability<br />
06:00 - Finding an XSS in Contact Us<br />
08:15 - Using the banners to find what version of Ubuntu the target is using<br />
11:50 - Building v8 in Ubuntu 18.04<br />
18:20 - Warning about needing 4 gigs of memory.<br />
23:30 - Everything is compiled!  Start of the exploit, looking at some webpages that help out<br />
24:30 - Starting v8 in gdb, then examining some memory structures<br />
29:00 - Explaining Smi, Immediate Small Integer<br />
30:00 - Starting our helper script with number conversions (float/bigint/hex)<br />
34:10 - Doing DebugPrints on our float arrays to examine memory<br />
38:40 - Digging into the memory to see where Map/Property/Elements/Length are in the memory<br />
50:20 - Showing Objects in memory<br />
58:15 - Precursor material to AddrOf and FakeObject, why type confusion leads to memory shenanigans<br />
1:06:30 - Finding GetLastElement() behaves different on object arrays<br />
1:17:00 - Doing Faiths AddrOf and troubleshooting why it doesn't work in ours<br />
1:22:27 - Recoding the AddrOf, to start out with an array not object<br />
1:26:45 - Explaining the FakeObj Primative<br />
1:33:20 - Doing the Read Memory portion<br />
1:37:50 - Coding the Write Memory function<br />
1:40:40 - Using Web Assembly to create RWX<br />
1:42:30 - Doing some memory analysis to find where our RWX location is<br />
1:46:30 - Doing some memory analysis to find where the Backing Store address is<br />
1:50:10 - Using MSFVenom to create some shellcode to touch a file<br />
1:54:20 - Replacing the shellcode with a reverse shell!<br />
1:56:30 - Testing on the custom chrome browser<br />
1:58:30 - Running our exploit against the target!</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="516617421" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/9a0c5632-d217-4aba-8c65-484b7e7d29b3?videoFileIds=17672"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/k2iMkS6boM5xht9Vs8qxP2"/>
            <media:player url="https://stream.echo6.co/w/k2iMkS6boM5xht9Vs8qxP2"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/5a61698c-92c2-453d-b32b-b8697ae59607-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="516617421" url="https://stream.echo6.co/static/web-videos/333ff1db-0094-433c-a135-061c1101fa94-1080.mp4" framerate="60" duration="7220" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/1ea11d07-a6c8-4420-9ad4-cb5ae5293447.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/057f089c-c5bb-4e0e-87e5-090536ae8464.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Rope2</media:title>
            <media:description type="plain">00:00 - Intro 01:15 - Start of nmap 02:30 - Checking out the webpages, find Gitlab and Page about a custom chrome 03:25 - Viewing the Git log for the custom v8 javascript project and finding the vulnerability 06:00 - Finding an XSS in Contact Us 0...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Delivery]]></title>
            <link>https://stream.echo6.co/w/kNfSdhz29yZuFvhsruxVLV</link>
            <guid>https://stream.echo6.co/w/kNfSdhz29yZuFvhsruxVLV</guid>
            <pubDate>Sun, 29 Mar 2026 09:26:21 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 00:46 - Starting with nmap 02:15 - Enumerating the website to see links to the HelpDesk and Mattermost 03:40 - Attempting to enumerate the version of osTicket 05:45 - Searchsploit json output shows the date 06:30 - No exploits found,...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
00:46 - Starting with nmap<br />
02:15 - Enumerating the website to see links to the HelpDesk and Mattermost<br />
03:40 - Attempting to enumerate the version of osTicket<br />
05:45 - Searchsploit json output shows the date<br />
06:30 - No exploits found, lets open a new ticket and see it gives us a way to update the ticket via email<br />
08:40 - Creating an account on Mattermost with the email of the helpdesk to get the activation link<br />
09:30 - Viewing the internal chat and seeing a password, then SSHing to the server<br />
11:50 - Using hashcat to create a wordlist with its internal rule system<br />
12:20 - Going over how Hashcat Rule files work<br />
15:20 - Root #1: Running sucrack to bruteforce the root users password<br />
19:50 - Root #2: Cracking the Mattermost Password<br />
23:20 - Using hashcat to crack the Mattermost Password<br />
26:45 - Going over how i set up the email server on this box</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="81617588" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/a0530260-8f9c-4eda-92f2-368304ed2d59?videoFileIds=17671"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/kNfSdhz29yZuFvhsruxVLV"/>
            <media:player url="https://stream.echo6.co/w/kNfSdhz29yZuFvhsruxVLV"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/2dc2a1ff-73cf-407f-b3ee-9f8b353000df-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="81617588" url="https://stream.echo6.co/static/web-videos/385ce93b-c6a2-402e-acce-a33b9a3d0497-1080.mp4" framerate="60" duration="1691" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/d34e8485-fdc5-4140-beb2-22b31491f01d.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/d5173f65-5f74-49c5-86b6-1dd137ce5a15.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Delivery</media:title>
            <media:description type="plain">00:00 - Intro 00:46 - Starting with nmap 02:15 - Enumerating the website to see links to the HelpDesk and Mattermost 03:40 - Attempting to enumerate the version of osTicket 05:45 - Searchsploit json output shows the date 06:30 - No exploits found,...</media:description>
        </item>
        <item>
            <title><![CDATA[PHP Type Juggling - Why === is Important - Bug Bounty Tips]]></title>
            <link>https://stream.echo6.co/w/82yNff7vzfYD5LsDpmPyCW</link>
            <guid>https://stream.echo6.co/w/82yNff7vzfYD5LsDpmPyCW</guid>
            <pubDate>Sun, 29 Mar 2026 08:35:58 GMT</pubDate>
            <description><![CDATA[Join Intigriti here: https://go.intigriti.com/ippsec 00:00 - Intro 00:54 - Enumerating the application utilizes Laravel based upon a default cookie name. 01:30 - Jumping into a PHP Interpreter to show off the Type confusion bug. 03:30 - Trying t...]]></description>
            <content:encoded><![CDATA[<p>Join Intigriti here: <a href="https://go.intigriti.com/ippsec" target="_blank" rel="noopener noreferrer">https://go.intigriti.com/ippsec</a></p>
<p>00:00 - Intro<br />
00:54 - Enumerating the application utilizes Laravel based upon a default cookie name.<br />
01:30 - Jumping into a PHP Interpreter to show off the Type confusion bug.<br />
03:30 - Trying the same thing in Python, Javascript, Ruby, and showing that they aren't vulnerable in this way.<br />
05:30 - Talking about the importance of the Laravel API Middleware<br />
07:30 - Converting the GET request to have JSON Data<br />
08:40 - Changing the JSON Data to pass a boolean for password<br />
09:50 - Bypassing login with type confusion<br />
10:30 - Sponsor highlight Intigriti<br />
12:48 - End of sponsor highlight<br />
13:30 - Looking at the Laravel Code to find where the route is for the custom login function<br />
14:00 - Showing the vulnerable function</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="91242027" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/38e7ed2c-f605-4578-a453-f0c451c59116?videoFileIds=17670"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/82yNff7vzfYD5LsDpmPyCW"/>
            <media:player url="https://stream.echo6.co/w/82yNff7vzfYD5LsDpmPyCW"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/b1ad0f6c-4a03-4156-8f8a-8fda5efb6ed1-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="91242027" url="https://stream.echo6.co/static/web-videos/fce98565-604c-4fec-a14c-f45a2693630e-1080.mp4" framerate="60" duration="1020" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/e3730549-0be7-406d-ad41-c8ab984be954.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/2f89d851-2660-4072-8133-5bb90e335af3.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">PHP Type Juggling - Why === is Important - Bug Bounty Tips</media:title>
            <media:description type="plain">Join Intigriti here: https://go.intigriti.com/ippsec 00:00 - Intro 00:54 - Enumerating the application utilizes Laravel based upon a default cookie name. 01:30 - Jumping into a PHP Interpreter to show off the Type confusion bug. 03:30 - Trying t...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Stacked]]></title>
            <link>https://stream.echo6.co/w/tnWsRqfg3c96zRb7UziXvY</link>
            <guid>https://stream.echo6.co/w/tnWsRqfg3c96zRb7UziXvY</guid>
            <pubDate>Sun, 29 Mar 2026 08:35:44 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 00:57 - Start of Nmap 03:10 - Start of gobuster to enumerate VHOST and Files 07:15 - Showing how I like to find the needles in a haystack when it comes to parsing lots of data. 09:40 - Using google reverse image search to try to iden...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
00:57 - Start of Nmap<br />
03:10 - Start of gobuster to enumerate VHOST and Files<br />
07:15 - Showing how I like to find the needles in a haystack when it comes to parsing lots of data.<br />
09:40 - Using google reverse image search to try to identify what a logo means<br />
11:00 - Hunting for XSS, putting unique URL's in all fields (check for a callback later)<br />
13:45 - Going over the Docker Compose file we had downloaded<br />
14:50 - Discover our XSS Attack worked, looking for LocalStack CVE's and discovering one in the dashboard<br />
18:15 - Start of exploiting the XSS<br />
20:00 - Creating a CSRF to force the victim to navigate to pages and send us the date, read his email to discover an S3 Domain<br />
30:00 - Start of looking at creating an AWS Lambda application<br />
33:20 - Using aws cli to create a lambda function<br />
39:30 - Creating a malicious lambda, then using XSS to send the user to the LocalStack dashboard and trigger our code<br />
44:30 - Reverse shell returned on the docker container. Use PSPY to identify what localstack does when invoking lambda functions and finding an 0day<br />
49:30 - Testing out our 0day, creating a malicious lambda and injecting when localstack creates a docker to run the code<br />
51:50 - Got root on the localstack container, abusing our ability to create docker containers to escalate to root on the host system</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="210911054" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/ddb6ed4e-e5b9-42da-83bb-1d4c7cade73e?videoFileIds=17669"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/tnWsRqfg3c96zRb7UziXvY"/>
            <media:player url="https://stream.echo6.co/w/tnWsRqfg3c96zRb7UziXvY"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/be967774-53a9-4df2-9fde-b9f14a9067c6-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="210911054" url="https://stream.echo6.co/static/web-videos/36918ebe-9151-409d-a612-dcca56cd2f02-1080.mp4" framerate="60" duration="3605" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/c27fae55-255e-4e69-b8da-fac856187155.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/4a760b3a-b7e9-4239-b89e-4eebf680abcd.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Stacked</media:title>
            <media:description type="plain">00:00 - Intro 00:57 - Start of Nmap 03:10 - Start of gobuster to enumerate VHOST and Files 07:15 - Showing how I like to find the needles in a haystack when it comes to parsing lots of data. 09:40 - Using google reverse image search to try to iden...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Shibboleth]]></title>
            <link>https://stream.echo6.co/w/uDUuAv7TsRuLbYxKo9yx5i</link>
            <guid>https://stream.echo6.co/w/uDUuAv7TsRuLbYxKo9yx5i</guid>
            <pubDate>Sun, 29 Mar 2026 08:35:21 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 00:57 - Running NMAP 04:10 - The footer talks about BMC, explaining why I jumped to IPMI when reading this 05:30 - Running a Virtual Host (VHOST) Scan with Wfuzz to try and find a domain that points to an ILO 08:20 - Talking about IP...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
00:57 - Running NMAP<br />
04:10 - The footer talks about BMC, explaining why I jumped to IPMI when reading this<br />
05:30 - Running a Virtual Host (VHOST) Scan with Wfuzz to try and find a domain that points to an ILO<br />
08:20 - Talking about IPMI<br />
10:15 - Running Metasploit to dump the IPMI Hash and then crack it with hashcat<br />
15:10 - Running IPMITool to explore the interface, there isn't anything really here<br />
19:30 - Logging into Zabbix with the credentials and then fumbling around creating a malicious check<br />
27:50 - Discovering what we were doing wrong, we didn't want to put quotes in the system.run command<br />
29:25 - Zabbix kills our shell pretty quickly, just running a second command really fast in order to keep a process alive<br />
32:00 - Attempting to get into the Zabbix database, need to switch to the ipmi-svc user<br />
34:57 - Showing a cool MySQL command \G to display results in a table form, useful when dumping a lot of columns<br />
36:05 - Running LinPEAS<br />
39:30 - No real exploit paths found, checking for exploits in the MYSQL Server and finding CVE-2021-27928 (WSREP)<br />
41:10 - Performing the MySQL WSREP Exploit and getting root</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="164754118" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/e80ac07f-1bd5-42f1-991a-3077f6358fd5?videoFileIds=17668"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/uDUuAv7TsRuLbYxKo9yx5i"/>
            <media:player url="https://stream.echo6.co/w/uDUuAv7TsRuLbYxKo9yx5i"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/01525c85-4545-41d9-a887-060e5a73032c-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="164754118" url="https://stream.echo6.co/static/web-videos/591492bb-e4f8-4b53-a003-4adc8dc20a5f-1080.mp4" framerate="60" duration="2661" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/e30aa1a2-5671-4124-ac6f-8f817cfa22c4.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/b903ab79-4e0e-41bd-a99b-9643b8499ed9.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Shibboleth</media:title>
            <media:description type="plain">00:00 - Intro 00:57 - Running NMAP 04:10 - The footer talks about BMC, explaining why I jumped to IPMI when reading this 05:30 - Running a Virtual Host (VHOST) Scan with Wfuzz to try and find a domain that points to an ILO 08:20 - Talking about IP...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Hancliffe]]></title>
            <link>https://stream.echo6.co/w/i7iXKdtBPwkcpgjyH7GHV2</link>
            <guid>https://stream.echo6.co/w/i7iXKdtBPwkcpgjyH7GHV2</guid>
            <pubDate>Sun, 29 Mar 2026 08:34:59 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:00 - Start of nmap 02:25 - Identifying it is a windows box via ping and looking at its TTL, and running Gobuster with a lowercase wordlist since windows is not case sensitive. 04:30 - Looking at HashPass to see it just generates s...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:00 - Start of nmap<br />
02:25 - Identifying it is a windows box via ping and looking at its TTL, and running Gobuster with a lowercase wordlist since windows is not case sensitive.<br />
04:30 - Looking at HashPass to see it just generates static passwords based upon Name/Website/Master Password<br />
08:40 - Identifying a JSESSIONID cookie given when accessing /maintenance/ which enables a weird path traversal vuln [MasterRecon]<br />
12:15 - Identifying the Nuxeo application and searching for the web vulnerability<br />
15:55 - Testing for SSTI in an error message, normal SSTI doesn't work since it is java. Going to payloadallthethings to get a valid payload<br />
19:40 - Testing an java EL SSTI Payload to get code execution. Don't get output but can validate we run code via ping<br />
21:25 - Getting a reverse shell<br />
24:25 - Looking at listening ports, running a powershell snippet to get process name and the port they listen on<br />
29:15 - Looking for an exploit with Unified Remote.  Using Chisel to forward the port it listens on to us.<br />
33:30 - Going over the Unified Remote Exploit script, changing where it writes files to and using msfvenom to generate a malicious exe for us<br />
37:00 - What i say here is wrong... I did not notice I got a shell back when writing to C:\Windows\Temp... lol.<br />
39:09 - Converting the Unified Remote script to Python3 with some vim macro magic<br />
42:10 - Running WinPEAS and discovering a Firefox credential<br />
50:10 - Using HashPash with the creds WinPEAS displayed to get the development users password. Using chisel to forward WinRM to us and accessing the box as development<br />
55:00 - Start of RE of the MyFirstApp Binary. Opening Ghidra<br />
55:30 - Searching for Strings to find where Username: is in the program and looking at code around it to see how authentication works<br />
1:00:40 - Looking at Encrypt1() and discovering it is just Rot47<br />
1:04:30 - Looking at Encrypt2() and discovering it is just AtBash<br />
1:12:45 - Logging into the application and discovering what is available to us after auth<br />
1:16:10 - Discovering a buffer overflow in the code parameter, then opening it in x32dbg and seeing we overwrite EIP<br />
1:22:55 - EIP Overwrote, looking at ESP we only have 10 bytes of space here. Talking about JMP Backwards to get to a spot where we have more space<br />
1:25:00 - Start of pwntools script, using x32dbg to show us a JMP ESP<br />
1:27:00 - Using msf-metasm_shell to generate shellcode for us<br />
1:32:05 - Disabling DEP for our process on our windows box<br />
1:35:10 - Showing we can use the JMP ESP, to execute our JMP -70 to get back to the start of our userinput. Its still not large enough for a revshell need to use Socket Reuse to increase buffer size<br />
1:38:20 - Setting a breakpoint on a recv() call and looking at the stack.. We will have to mirror this.<br />
1:42:40 - Getting the location of the Socket Handle which is ESP+0x48, then writing shell code to save that<br />
1:45:50 - When trying to add 48, we get a null byte which is bad.  Using an add/sub call to add 48 without null bytes<br />
1:51:20 - Moving ESP to the other side of EIP so we don't have to worry about overwriting EIP and buffer overflowing the program again<br />
1:55:30 - Getting 0 on the stack by just xor ebx, ebx - Then pushing the size of data we want<br />
2:00:35 - Pointing the memory address recv saves data to within our junk data, as this is where the program returns to after the call<br />
2:03:35 - Using Ghidra to get the memory address of the RECV() function, so we can call it<br />
2:09:45 - Using MSFVenom to generate the shellcode for a reverse shell and testing out the exploit<br />
2:13:50 - Showing by setting EXITFUNC=THREAD we don't kill the program when we exit our shell<br />
2:15:50 - Updating our script to point at the hancliffe machine and getting our shell</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="582991070" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/8a8ce386-bc7d-4171-9263-a78ca5349007?videoFileIds=17667"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/i7iXKdtBPwkcpgjyH7GHV2"/>
            <media:player url="https://stream.echo6.co/w/i7iXKdtBPwkcpgjyH7GHV2"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/40442769-8cb9-4539-9e64-1dac4d5d4901-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="582991070" url="https://stream.echo6.co/static/web-videos/d06c2748-3a82-493e-aebb-614491629b2d-1080.mp4" framerate="60" duration="8379" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/c067b376-be8c-49ae-b78b-fcb9b6328460.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/632913e8-11e5-4242-a2b9-01d445da681a.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Hancliffe</media:title>
            <media:description type="plain">00:00 - Intro 01:00 - Start of nmap 02:25 - Identifying it is a windows box via ping and looking at its TTL, and running Gobuster with a lowercase wordlist since windows is not case sensitive. 04:30 - Looking at HashPass to see it just generates s...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Static]]></title>
            <link>https://stream.echo6.co/w/4ZGiZda8SGPbqMCD7N3W6X</link>
            <guid>https://stream.echo6.co/w/4ZGiZda8SGPbqMCD7N3W6X</guid>
            <pubDate>Sun, 29 Mar 2026 08:34:26 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:05 - Start of nmap 02:50 - Noticing there is weird behavior on /vpn, it doesn't direct to the folder /vpn/ probably reverse proxy [MasterRecon] 04:20 - Corrupted GZIP, using zcat to view it and fixgz to repair 08:30 - Building a P...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:05 - Start of nmap<br />
02:50 - Noticing there is weird behavior on /vpn, it doesn't direct to the folder /vpn/ probably reverse proxy [MasterRecon]<br />
04:20 - Corrupted GZIP, using zcat to view it and fixgz to repair<br />
08:30 - Building a Python Script to generate TOTP for MFA (the NTPDate failed because i didn't use -q.  Nmap would have worked with -sV)<br />
14:20 - Talking about things I would be monitoring for on Login Forms [Detection]<br />
16:45 - Talking about a common issue when layering VPN's (MTU). Won't fix it right now, since I want to display the weird behavior later<br />
20:15 - VPN Connection established, looking at routes.  Adding additional routes that don't exist<br />
28:30 - Going over the NMAP ran from the second VPN<br />
30:40 - Fully understanding the weird behavior from /vpn earlier on. It is indeed a reverse proxy. [MasterRecon]<br />
32:00 - Exploiting the fact that XDEBUG is enabled on info.php<br />
41:40 - Running Chisel to create a pivot rhrough web to access mysql<br />
42:10 - The Multiple VPN MTU Issue explained, demonstrating i can't send big packets because of chunking<br />
48:00 - Finishing with setting up the chisel tunnel<br />
51:45 - Switching up chisel to look at PKI.<br />
53:34 - Running PHuiP-FPizdaM to exploit PHP-FPM/7.1<br />
57:23 - Changing up our Chisel so we can send a reverse shell through the web box<br />
1:01:45 - Looking at the ersatool source code to find a printf/format string vulnerability<br />
1:04:15 - Verifying we have the format string vuln and some really basic talk about it<br />
1:07:30 - Exploring the memory around our leaked address to defeat ASLR and edit the variable we want<br />
1:10:30 - Start of a pwntools script to exploit format string<br />
1:15:48 - Pwntools successful leak and calculating offset to the string we want to manipulate... cleaning up the script a little<br />
1:19:05 - Explaining how we are going to write to an address and why the null byte is a small problem<br />
1:27:15 - Overwriting the ERSA_DIR variable<br />
1:33:55 - Tons of funny failing trying to verify this exploit worked<br />
1:38:00 - Updating and explaining our chisel tunnel since we are proxying a lot of traffic bidirectionally through this web box<br />
1:45:30 - Using cat to transfer a file over /dev/tcp, the trick is to base64 encode<br />
1:50:50 - Using socat to have a binary (ersatool) listen on a TCP Port, so we can use pwntools to exploit it<br />
1:52:45 - Updating pwntools to use a TCP Socket<br />
1:55:50 - We can't execute out of /dev/shm, updating script to use /tmp<br />
2:11:00 - Getting a reverse shell</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="425929283" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/2059a721-b0a3-4cf0-b2d1-343cb5811421?videoFileIds=17666"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/4ZGiZda8SGPbqMCD7N3W6X"/>
            <media:player url="https://stream.echo6.co/w/4ZGiZda8SGPbqMCD7N3W6X"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/feac3a29-57e6-4682-9f5a-cc39a4d7f350-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="425929283" url="https://stream.echo6.co/static/web-videos/b175dea9-c9a6-4a0a-a6ec-eb4e6040f07d-1080.mp4" framerate="60" duration="7938" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/9f96bbee-aaef-4645-9ebd-f55b0a516170.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/0a265caf-74cf-4227-9115-1455242e5d5f.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Static</media:title>
            <media:description type="plain">00:00 - Intro 01:05 - Start of nmap 02:50 - Noticing there is weird behavior on /vpn, it doesn't direct to the folder /vpn/ probably reverse proxy [MasterRecon] 04:20 - Corrupted GZIP, using zcat to view it and fixgz to repair 08:30 - Building a P...</media:description>
        </item>
        <item>
            <title><![CDATA[PowerSIEM - Analyzing Sysmon Events with PowerShell - Dynamic Malware Analysis]]></title>
            <link>https://stream.echo6.co/w/54zbzQEUdvWKmGxuYNycge</link>
            <guid>https://stream.echo6.co/w/54zbzQEUdvWKmGxuYNycge</guid>
            <pubDate>Sun, 29 Mar 2026 08:34:01 GMT</pubDate>
            <description><![CDATA[PowerSiem: https://github.com/IppSec/PowerSiem Creating PowerSiem: https://www.twitch.tv/videos/1438252177 Sysmon: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon Sysmon Configuration File: https://github.com/Neo23x0/sysmon-config ...]]></description>
            <content:encoded><![CDATA[<p>PowerSiem: <a href="https://github.com/IppSec/PowerSiem" target="_blank" rel="noopener noreferrer">https://github.com/IppSec/PowerSiem</a><br />
Creating PowerSiem: <a href="https://www.twitch.tv/videos/1438252177" target="_blank" rel="noopener noreferrer">https://www.twitch.tv/videos/1438252177</a><br />
Sysmon: <a href="https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon" target="_blank" rel="noopener noreferrer">https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon</a><br />
Sysmon Configuration File: <a href="https://github.com/Neo23x0/sysmon-config" target="_blank" rel="noopener noreferrer">https://github.com/Neo23x0/sysmon-config</a></p>
<p>00:00 - Intro<br />
00:36 - Talking about PowerSIEM<br />
01:40 - Installing Sysmon with Florian Roth's default config<br />
03:30 - Showing what PowerSIEM does by running it and opening a command prompt, browser, etc<br />
04:50 - Explaining the PowerSIEM Script, how it works, and all the current sysmon events<br />
07:50 - Setting breakpoints in Powershell ISE<br />
08:48 - Adding data to the Registry Set event<br />
11:58 - Showing just running a SysInternals tool creates a registry key for accepting the EULA<br />
13:45 - Running Impackets PSEXEC, to find out Defender stopps it.  Running Sysinternals Version and showing defender allows it.<br />
14:50 - Using PowerSIEM to show how the Sysinternals PSEXEC works.<br />
15:50 - Disabling AV, Running impacket's version again to show how it differs<br />
17:35 - Creating a Cobalt Strike Beacon and showing some alerts<br />
18:25 - Hiding network connection alerts in PowerSIEM by just commenting out the Write Alert line<br />
20:00 - Running a shell command in CobaltStrike and showing what it looks like in PowerSIEM<br />
21:00 - Running Mimikatz and talking about its sacrificial process, pipes, and mimikatz accessing LSASS<br />
24:05 - Showing not everything will be logged</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="170615745" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/20e43c41-91f1-484e-bb28-01dca39f7d5f?videoFileIds=17665"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/54zbzQEUdvWKmGxuYNycge"/>
            <media:player url="https://stream.echo6.co/w/54zbzQEUdvWKmGxuYNycge"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/62c590c1-232e-4c41-9b3d-58f2a2433562-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="170615745" url="https://stream.echo6.co/static/web-videos/c9aa5bc4-41a9-40f5-8848-37dc7233aba2-1080.mp4" framerate="60" duration="1502" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/d66041d0-29b6-4279-8cb9-e570e09015cc.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/7b7dcaf1-b5ad-4f0d-ac92-6478e363da8f.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">PowerSIEM - Analyzing Sysmon Events with PowerShell - Dynamic Malware Analysis</media:title>
            <media:description type="plain">PowerSiem: https://github.com/IppSec/PowerSiem Creating PowerSiem: https://www.twitch.tv/videos/1438252177 Sysmon: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon Sysmon Configuration File: https://github.com/Neo23x0/sysmon-config ...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Developer]]></title>
            <link>https://stream.echo6.co/w/whUWExMFdxw29LTFvzPFrt</link>
            <guid>https://stream.echo6.co/w/whUWExMFdxw29LTFvzPFrt</guid>
            <pubDate>Sun, 29 Mar 2026 08:33:40 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:04 - Start of nmap 03:00 - Examining the web page, noticing every URL with admin gets redirected to a django login 05:00 - Creating an account and looking at the page to discover CTF Challenges 06:15 - CHALLENGE 1: Phished List, a...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:04 - Start of nmap<br />
03:00 - Examining the web page, noticing every URL with admin gets redirected to a django login<br />
05:00 - Creating an account and looking at the page to discover CTF Challenges<br />
06:15 - CHALLENGE 1: Phished List, a protected excel spreadsheet. Remove protection to see hidden cells<br />
11:50 - Submitting a writeup, discovering an old version of Firefox talks to us<br />
14:00 - Checking for Tab Nabbing vulnerability and explaining it<br />
17:30 - Creating a phishing page by mirroring the page with wget and then using PHP to log submitted credentials<br />
29:30 - Phishing worked, got the admin's password. Login to Django to see another website (Sentry)<br />
33:00 - Creating an error message in Sentry to get an error message, which contains a secret key used to encrypt the cookie<br />
36:10 - Grabbing a django deserialization payload then installing django on python2 to use the payload<br />
40:15 - Changing the payload in the exploit to a reverse shell, avoiding any bad characters for URL and getting a reverse shell<br />
41:30 - Setting up the reverse shell in a way that works with ZSH, just need to do stty raw -echo; fg on one line<br />
46:13 - Logging into Sentry Postgres Databae then enumerating tables and dumping the users table and cracking karl's password<br />
52:25 - Discovering Karl can execute the authenticator binary with sudo, strings shows it is a rust binary. Copy it back to our box<br />
56:55 - Examing the binary in Ghidra<br />
58:55 - Discovering a call to Crypto::AES::CTR, using the rust docs to figure out what our variables are<br />
1:01:22 - Showing that AES-CTR does not have defined block sizes<br />
1:05:00 - Using GDB to help our analysis, showing how to setup break points around what our decompiler shows<br />
1:10:36 - Examining memory to confirm our static analysis was correct<br />
1:11:15 - Grabbing the encrypted blob the program is comparing against to get the password and getting root<br />
1:15:40 - CHALLENGE 2: PSE, an dotnet binary that runs a uses PS2EXE to run powershell to encrypt a string<br />
1:21:20 - CHALLENGE 3: Get Lucky, a small binary that rolls a dice.  We exploit it mainly in GDB but after recording, probably could have done LD_PRELOAD, im not sure<br />
1:34:50 - CHALLENGE 4: RevMe.exe, just open the binary in DNSpy and grab the flag, also show doing this with strings if we change the encoding<br />
1:37:10 - CHALLENGE 5: Authentication, another Rust binary. Just have to find the correct spot to set a break point and see the password in memory<br />
1:44:40 - CHALLENGE 6: PwnMe, a simple challenge that we can use GDB to find the password<br />
1:49:30 - CHALLENGE 7: Easy Encryption, a simple XOR Challenge where we can use known plaintext (or bruteforce) to recover the key<br />
1:53:29 - CHALLENGE 8: Triple Wamy, another XOR Challenge where we have to just do the XOR's backwards to get the flag</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="523288525" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/f54eafe5-2a5b-4983-869a-e83bd73aa109?videoFileIds=17664"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/whUWExMFdxw29LTFvzPFrt"/>
            <media:player url="https://stream.echo6.co/w/whUWExMFdxw29LTFvzPFrt"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/cbcbd7de-3ae9-442b-b004-218a00617dff-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="523288525" url="https://stream.echo6.co/static/web-videos/0d86abb9-27d5-46a0-bda7-5874ad0bf71d-1080.mp4" framerate="60" duration="7017" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/8c86b988-2519-42a6-8191-23b910425127.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/b292649c-d0c3-407b-9307-78804bf91ec4.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Developer</media:title>
            <media:description type="plain">00:00 - Intro 01:04 - Start of nmap 03:00 - Examining the web page, noticing every URL with admin gets redirected to a django login 05:00 - Creating an account and looking at the page to discover CTF Challenges 06:15 - CHALLENGE 1: Phished List, a...</media:description>
        </item>
        <item>
            <title><![CDATA[HackTheBox - Previse]]></title>
            <link>https://stream.echo6.co/w/ivmq8PfYWqUKyoMwc3TMXe</link>
            <guid>https://stream.echo6.co/w/ivmq8PfYWqUKyoMwc3TMXe</guid>
            <pubDate>Sun, 29 Mar 2026 08:33:17 GMT</pubDate>
            <description><![CDATA[00:00 - Intro 01:00 - Start of nmap 02:00 - Running GoBuster, discovering the redirects have filesizes 03:00 - Showing the Execute After Read vulnerability (EAR) by using BurpSuite to hit / and discovering the page 04:00 - Using grep to show us on...]]></description>
            <content:encoded><![CDATA[<p>00:00 - Intro<br />
01:00 - Start of nmap<br />
02:00 - Running GoBuster, discovering the redirects have filesizes<br />
03:00 - Showing the Execute After Read vulnerability (EAR) by using BurpSuite to hit / and discovering the page<br />
04:00 - Using grep to show us only what we want (oP)<br />
06:30 - Using BurpSuite to intercept the response to the request so we can disable the redirect (EAR). Then using the webform to create an account (IDOR)<br />
08:00 - Examining the website source, using grep to look for places with user input<br />
11:30 - Testing the logs.php page for shell injection, then getting a reverse shell<br />
13:30 - Going into the webconfig to get database creds, then dump and crack creds<br />
19:50 - Testing local users with the passwords from the database to get m4lwhere's creds<br />
20:25 - Checking sudo to see something is weird, the env_reset/secure_path is not there. (this is configured in /etc/sudoers)<br />
22:10 - Explaining Path Injection, then taking advantage of a script in sudo not using absolute paths<br />
25:30 - Going back to explain things, weird behavior of the webserver always hanging. Maybe it was trying to send me a webshell? idk<br />
28:00 - Fuzzing parameters of accounts.php to create accounts. But first discovering how important the Content-Type header is!<br />
30:50 - Using WFUZZ to fuzz the confirmation  parameter<br />
35:20 - Explaining how the EAR Vulnerability happened in the code and how to fix it</p>
]]></content:encoded>
            <dc:creator>(YT)IppSec</dc:creator>
            <enclosure length="136611492" type="video/mp4" url="https://stream.echo6.co/download/videos/generate/8dc48228-5dd3-4721-a9e6-877520664fcf?videoFileIds=17663"/>
            <media:community>
                <media:statistics views="0"/>
            </media:community>
            <media:embed url="https://stream.echo6.co/videos/embed/ivmq8PfYWqUKyoMwc3TMXe"/>
            <media:player url="https://stream.echo6.co/w/ivmq8PfYWqUKyoMwc3TMXe"/>
            <media:group>
                <media:peerLink type="application/x-bittorrent" href="https://stream.echo6.co/lazy-static/torrents/1e5fcdbe-8f7c-42e3-8e4d-5a8602ab46b5-1080.torrent" isDefault="false"/>
                <media:content type="video/mp4" medium="video" height="1080" fileSize="136611492" url="https://stream.echo6.co/static/web-videos/b08e62b2-3c8e-4c05-8615-2a654e7a50ac-1080.mp4" framerate="60" duration="2262" isDefault="true"/>
            </media:group>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/previews/d1293777-082f-4233-8a9b-685c8c3f63d0.jpg"/>
            <media:thumbnail url="https://stream.echo6.co/lazy-static/thumbnails/4401b314-8f2e-4643-bbba-26f183613e85.jpg"/>
            <media:rating>nonadult</media:rating>
            <media:title type="plain">HackTheBox - Previse</media:title>
            <media:description type="plain">00:00 - Intro 01:00 - Start of nmap 02:00 - Running GoBuster, discovering the redirects have filesizes 03:00 - Showing the Execute After Read vulnerability (EAR) by using BurpSuite to hit / and discovering the page 04:00 - Using grep to show us on...</media:description>
        </item>
    </channel>
</rss>