<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Easy on Nitel&#39;s Red Logs</title>
    <link>/tags/easy/</link>
    <description>Recent content in Easy on Nitel&#39;s Red Logs</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Mon, 12 Jan 2026 12:33:00 +0000</lastBuildDate><atom:link href="/tags/easy/index.xml" rel="self" type="application/rss+xml" /><item>
      <title>Cicada — HackTheBox Writeup</title>
      <link>/posts/cicada/</link>
      <pubDate>Mon, 12 Jan 2026 12:33:00 +0000</pubDate>
      
      <guid>/posts/cicada/</guid>
      <description>An easy-rated HTB Active Directory machine. The attack chain involves SMB guest enumeration, RID brute-forcing, password spraying, LDAP dumping, and finally abusing SeBackupPrivilege to extract the Administrator hash.</description>
    </item>
    
    <item>
      <title>Busqueda — HackTheBox Writeup</title>
      <link>/posts/busqueda/</link>
      <pubDate>Thu, 08 Jan 2026 11:57:00 +0000</pubDate>
      
      <guid>/posts/busqueda/</guid>
      <description>A walkthrough of HackTheBox Searcher — exploiting CVE-2023-43364 (Searchor 2.4.0 RCE) for initial access, then leveraging a path injection vulnerability in a privileged Python script to escalate to root.</description>
    </item>
    
    
  </channel>
</rss>
