<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>HomeBrewedHacker</title>
    <link>/</link>
    <description>Recent content on HomeBrewedHacker</description>
    <image>
      <title>HomeBrewedHacker</title>
      <url>/images/papermod-cover.png</url>
      <link>/images/papermod-cover.png</link>
    </image>
    <generator>Hugo -- 0.151.0</generator>
    <language>en</language>
    <copyright>PaperMod Contributors</copyright>
    <lastBuildDate>Tue, 20 Jun 2023 10:48:02 -0700</lastBuildDate>
    <atom:link href="/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Hack The Box Precious Machine Walkthrough</title>
      <link>/posts/htb-precious/</link>
      <pubDate>Tue, 20 Jun 2023 10:48:02 -0700</pubDate>
      <guid>/posts/htb-precious/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Welcome to my first Hack The Box machine walkthrough.  This system is one that I had the privilege of doing live and am now going to
post my process of popping root since the machine has since retired.  Here is a quick overview of the machine as stated directly
from &lt;a href=&#34;https://app.hackthebox.com/machines/Precious/information&#34;&gt;HTB&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Precious is an Easy Difficulty Linux machine, that focuses on the &lt;code&gt;Ruby&lt;/code&gt; language.
It hosts a custom &lt;code&gt;Ruby&lt;/code&gt; web application, using an outdated library, namely pdfkit, which is vulnerable to &lt;code&gt;CVE-2022-25765&lt;/code&gt;,
leading to an initial shell on the target machine. After a pivot using plaintext credentials that are found
in a Gem repository &lt;code&gt;config&lt;/code&gt; file, the box concludes with an insecure deserialization attack on a custom, outdated, &lt;code&gt;Ruby&lt;/code&gt; script.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>About Me</title>
      <link>/about/</link>
      <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
      <guid>/about/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m nobody, really.  However, if I had to describe myself, you might call me a wannabe hacker, code cracker, slacker. Wastin time with all the chatroom yakkers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Links</title>
      <link>/links/</link>
      <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
      <guid>/links/</guid>
      <description>&lt;p&gt;Here shall be links to my favorite sites!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nmap Tutorial: The 80% Guide</title>
      <link>/posts/nmap-tutorial-80-percent/</link>
      <pubDate>Tue, 31 Jan 2023 21:54:23 -0800</pubDate>
      <guid>/posts/nmap-tutorial-80-percent/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Since this will be my first ever post on this site, what better tool to cover than NMAP!
Other than some basic Linux, this was the first tool that I learned on my quest to learn penetration testing.
It will likely be the first tool that you start learning as well.  I always enjoy starting up NMAP on a new box or challenge,
and waiting to see what juicy tidbits it discovers.  Am I going to have a lot of interesting open ports to explore
(and maybe a lot of rabbit holes), or will I only have a couple of open ports which funnels my efforts towards these services?
This tool is what starts unlocking the mystery of every box.  I feel that this guide follows the 80/20 rule.  I am probably only providing
about 20% of NMAP&amp;rsquo;s capabilities, but this will likely be the techniques and commands you use 80% of the time. Let&amp;rsquo;s get started!&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
