<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Python2-Injection on Nitel&#39;s Red Logs</title>
    <link>/tags/python2-injection/</link>
    <description>Recent content in Python2-Injection on Nitel&#39;s Red Logs</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Fri, 09 Jan 2026 23:42:00 +0000</lastBuildDate><atom:link href="/tags/python2-injection/index.xml" rel="self" type="application/rss+xml" /><item>
      <title>UpDown - HackTheBox Writeup</title>
      <link>/posts/updown/</link>
      <pubDate>Fri, 09 Jan 2026 23:42:00 +0000</pubDate>
      
      <guid>/posts/updown/</guid>
      <description>&lt;strong&gt;UpDown&lt;/strong&gt; is a medium Linux box where you chain an exposed &lt;code&gt;.git&lt;/code&gt; repo, a custom header bypass, and a Phar wrapper LFI + file upload to get a shell. Root involves Python 2 &lt;code&gt;input()&lt;/code&gt; injection on a SUID binary, then &lt;code&gt;easy_install&lt;/code&gt; sudo abuse via GTFOBins.</description>
    </item>
    
    
  </channel>
</rss>
