<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>bash on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/bash/</link><description>Recent content in bash on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Thu, 25 Feb 2021 03:04:29 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/bash/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox Writeup - Emdee 5 For Life</title><link>https://ahessmat.netlify.com/post/2021-02-hackthebox-writeup-emdee-5-for-life/</link><pubDate>Thu, 25 Feb 2021 03:04:29 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2021-02-hackthebox-writeup-emdee-5-for-life/</guid><description>Preamble Hack the Box (HTB) offers an array of challenges irrespective of the Active/Retired machine list. One such challenge is &amp;ldquo;Emdee five for Life&amp;rdquo; which presents an interesting one-off web problem.
On initially starting the target, the attacker is presented with an IPv4 address and port which we can navigate to in a web browser:
In the image above, the left snapshot is what we see in the browser and the right is what is visible within the request when we click &amp;ldquo;Submit&amp;rdquo;.</description></item></channel></rss>