<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Challenge on s4yhii&#39;s blog</title>
    <link>https://blog.s4yhii.com/tags/challenge/</link>
    <description>Recent content in Challenge on s4yhii&#39;s blog</description>
    <image>
      <title>s4yhii&#39;s blog</title>
      <url>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://blog.s4yhii.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.155.3</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 01 Jul 2022 12:00:00 -0400</lastBuildDate>
    <atom:link href="https://blog.s4yhii.com/tags/challenge/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HackTheBox Web Challenges</title>
      <link>https://blog.s4yhii.com/posts/2022-07-01-web-challenges-htb/</link>
      <pubDate>Fri, 01 Jul 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-07-01-web-challenges-htb/</guid>
      <description>&lt;h1 id=&#34;templated&#34;&gt;Templated&lt;/h1&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch0.jpg&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Dificulty: easy&lt;/li&gt;
&lt;li&gt;Description: Can you exploit this simple mistake?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;solution&#34;&gt;Solution&lt;/h2&gt;
&lt;p&gt;First we visit the site and see that uses jinja2, this template is susceptible to &lt;code&gt;SSTI attacks&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch1.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;We see that the directory searched is rendered in the page with 25, so its vulnerable to SSTI.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://raw.githubusercontent.com/s4yhii/s4yhii.github.io/master/assets/images/htb/challenges/ch2.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;We use the payload that will allow us to &lt;code&gt;RCE&lt;/code&gt; on the server to read the file &lt;code&gt;flag.txt&lt;/code&gt;, we extract it from &lt;a href=&#34;https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Server%20Side%20Template%20Injection/README.md#jinja2---remote-code-execution&#34;&gt;PayloadsAllTheThings&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cloud Resume Challenge</title>
      <link>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</link>
      <pubDate>Mon, 10 Jan 2022 12:00:00 -0400</pubDate>
      <guid>https://blog.s4yhii.com/posts/2022-01-10-aws-cloud-resume-challenge/</guid>
      <description>&lt;h1 id=&#34;cloud-resume-challenge&#34;&gt;Cloud Resume Challenge&lt;/h1&gt;
&lt;h2 id=&#34;setup-aws&#34;&gt;Setup AWS&lt;/h2&gt;
&lt;p&gt;Create your aws account&lt;/p&gt;
&lt;p&gt;Setup MFA for your roor account&lt;/p&gt;
&lt;p&gt;Create an IAM user&lt;/p&gt;
&lt;p&gt;Assign permission (Principle of Least privilege)&lt;/p&gt;
&lt;p&gt;Setup Vault (&lt;a href=&#34;https://github.com/99designs/aws-vault&#34;&gt;https://github.com/99designs/aws-vault&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;aws-vault add myuser ( ex: aws-vault add dev)&lt;/p&gt;
&lt;p&gt;aws-vault exex myuser — aws s3 ls&lt;/p&gt;
&lt;h2 id=&#34;setup-s3&#34;&gt;Setup S3&lt;/h2&gt;
&lt;p&gt;What is s3: file service useful for storing files usually for host a website&lt;/p&gt;
&lt;p&gt;What is AWS SAM: server less application model&lt;/p&gt;
&lt;p&gt;we will create an AWS Lambda (we ignore this for now)&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
