<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Linux on v4lle&#39;s Blog</title>
    <link>/tags/linux/</link>
    <description>Recent content in Linux on v4lle&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 04 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/tags/linux/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HackTheBox CodePartTwo Writeup</title>
      <link>/posts/codeparttwo/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>/posts/codeparttwo/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/codeparttwo/codeparttwo.png&#34; alt=&#34;codeparttwo&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;CodePartTwo is an easy difficulty Linux machine featuring a web-based JavaScript editor. The core of this challenge revolves around the &amp;ldquo;Run Code&amp;rdquo; functionality - a feature that is inherently dangerous if not properly isolated.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;Like always, we start by running an initial nmap scan to identify open ports:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Editor Writeup</title>
      <link>/posts/editor/</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <guid>/posts/editor/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/editor/editor.png&#34; alt=&#34;editor&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Editor&lt;/strong&gt; is an easy Linux machine running a vulnerable version of XWiki that allows unauthenticated remote code execution, providing an initial foothold. Enumeration of the system reveals a misconfigured SUID binary, which can be exploited to escalate privileges and gain root access.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Cap Writeup</title>
      <link>/posts/cap/</link>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      <guid>/posts/cap/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/cap/cap.png&#34; alt=&#34;cap&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Cap&lt;/strong&gt; is an easy difficulty Linux machine running an HTTP server that performs administrative functions including performing network captures. Improper controls result in Insecure Direct Object Reference (IDOR) giving access to another user&amp;rsquo;s capture. The capture contains plaintext credentials and can be used to gain foothold. A Linux capability is then leveraged to escalate to root.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Getting Started Writeup</title>
      <link>/posts/getting-started/</link>
      <pubDate>Wed, 13 Aug 2025 00:00:00 +0000</pubDate>
      <guid>/posts/getting-started/</guid>
      <description>&lt;p&gt;Getting Started is not really a box on HTB Labs, it is just a knowledge check in the Getting Started module of the Penetration Tester Job Role Path, but I am writing a Writeup about it anyway.&lt;/p&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Nibbles Writeup</title>
      <link>/posts/nibbles/</link>
      <pubDate>Fri, 08 Aug 2025 00:00:00 +0000</pubDate>
      <guid>/posts/nibbles/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/nibbles/nibbles.png&#34; alt=&#34;nibbles&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;nibbles&lt;/strong&gt; is a fairly simple machine, however with the inclusion of a login blacklist, it is a fair bit more challenging to find valid credentials. luckily, a username can be enumerated and guessing the correct password does not take long for most. This is my first box and also my first writeup.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
