

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://blog.0xprashant.in/</id>
  <title>Prashant Saini</title>
  <subtitle>Welcome to the official blog of Prashant Saini, also known as 0xprashant. This blog features cybersecurity write-ups from Hack The Box, RootME, and various CTFs, along with reviews of cybersecurity certifications to aid individuals in their growth and learning.</subtitle>
  <updated>2024-11-20T20:29:47+05:30</updated>
  <author>
    <name>Prashant Saini</name>
    <uri>https://blog.0xprashant.in/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://blog.0xprashant.in/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://blog.0xprashant.in/"/>
  <generator uri="https://jekyllrb.com/" version="4.3.4">Jekyll</generator>
  <rights> © 2024 Prashant Saini </rights>
  <icon>/assets/img/favicons/favicon.ico</icon>
  <logo>/assets/img/favicons/favicon-96x96.png</logo>


  
  <entry>
    <title>My OSCP Journey, Review, Timelines And Resources</title>
    <link href="https://blog.0xprashant.in/posts/oscp-review/" rel="alternate" type="text/html" title="My OSCP Journey, Review, Timelines And Resources" />
    <published>2021-08-23T00:00:00+05:30</published>
  
    <updated>2024-10-05T22:06:52+05:30</updated>
  
    <id>https://blog.0xprashant.in/posts/oscp-review/</id>
    <content src="https://blog.0xprashant.in/posts/oscp-review/" />
    <author>
      <name>Prashant Saini</name>
    </author>

  
    
    <category term="Exam Reviews" />
    
    <category term="OSCP" />
    
  

  <summary>This blog contains my honest review and oponion on OSCP Exam organized by Offensive Security. I am going to discuss about my OSCP journey, it’s lab and exam review, The whole timeline from begining to end, The Resources i used/followed during the preparation</summary>

  </entry>

  
  <entry>
    <title>Hackthebox LoveTok writeup</title>
    <link href="https://blog.0xprashant.in/posts/htb-lovetok/" rel="alternate" type="text/html" title="Hackthebox LoveTok writeup" />
    <published>2021-04-13T00:00:00+05:30</published>
  
    <updated>2024-10-19T20:58:49+05:30</updated>
  
    <id>https://blog.0xprashant.in/posts/htb-lovetok/</id>
    <content src="https://blog.0xprashant.in/posts/htb-lovetok/" />
    <author>
      <name>Prashant Saini</name>
    </author>

  
    
    <category term="Hackthebox" />
    
    <category term="challenges" />
    
    <category term="retired" />
    
  

  <summary>We are given the source code for the website hosted , There is a feature that will tell you the time you will get your true love. That time is Evaluate with the help of a eval() function and the eval function is a vulnerable to Command Injection itself , Exploiting the Command injection to get the flag.</summary>

  </entry>

  
  <entry>
    <title>Hackthebox Laboratory writeup</title>
    <link href="https://blog.0xprashant.in/posts/htb-laboratory/" rel="alternate" type="text/html" title="Hackthebox Laboratory writeup" />
    <published>2020-11-17T00:00:00+05:30</published>
  
    <updated>2024-10-05T22:06:52+05:30</updated>
  
    <id>https://blog.0xprashant.in/posts/htb-laboratory/</id>
    <content src="https://blog.0xprashant.in/posts/htb-laboratory/" />
    <author>
      <name>Prashant Saini</name>
    </author>

  
    
    <category term="Hackthebox" />
    
    <category term="retired" />
    
  

  <summary>The journey starts with a new VHOST that i got from the DNS of ssl certificate , Gitlab is hosted on the new vhost.The Current version of the gitlab-ce is vulnerable to LFI and RCE exploiting the RCE and getting initial shell in a docker , Resrting the admin account with github-rails console and login as him on gitlab.GOt the private ssh keys in a project-repo , Login as dexter and got a suid c...</summary>

  </entry>

  
  <entry>
    <title>Hackthebox Academy writeup</title>
    <link href="https://blog.0xprashant.in/posts/htb-academy/" rel="alternate" type="text/html" title="Hackthebox Academy writeup" />
    <published>2020-11-09T00:00:00+05:30</published>
  
    <updated>2024-10-05T22:06:52+05:30</updated>
  
    <id>https://blog.0xprashant.in/posts/htb-academy/</id>
    <content src="https://blog.0xprashant.in/posts/htb-academy/" />
    <author>
      <name>Prashant Saini</name>
    </author>

  
    
    <category term="Hackthebox" />
    
    <category term="retired" />
    
  

  <summary>Altering the administrator username by changing the roleid and login as admin on the web , two ways to get user one is admin page revealing  a new VHOST which is running on laravel , and the lavarel is exposing its app_key so its is vulnerable to RCE , Exploiting the RCE and get a shell as www-data . and second is reading the .env file and get the password for the user from academy dir , Hit an...</summary>

  </entry>

  
  <entry>
    <title>Hackthebox Time writeup</title>
    <link href="https://blog.0xprashant.in/posts/htb-time/" rel="alternate" type="text/html" title="Hackthebox Time writeup" />
    <published>2020-10-25T00:00:00+05:30</published>
  
    <updated>2024-10-05T22:06:52+05:30</updated>
  
    <id>https://blog.0xprashant.in/posts/htb-time/</id>
    <content src="https://blog.0xprashant.in/posts/htb-time/" />
    <author>
      <name>Prashant Saini</name>
    </author>

  
    
    <category term="Hackthebox" />
    
    <category term="retired" />
    
  

  <summary>There are two features on webiste ONLINE JSON BEAUTIFIER &amp;amp;amp; VALIDATOR the validator feature is vulnerable to a CVE and after searching about it bit more got initial shell as user , Privlege escaltion was bit easy there is a timer_backup script  that is in cronjobs and running as root, and we have write permissions to it , writing our rev shell to it and got root</summary>

  </entry>

</feed>


