<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>~/ROOT/WRITEUPS</title>
      <link>https://stag-nant.github.io</link>
      <description>Last 10 notes on ~/ROOT/WRITEUPS</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>M. Muhil // SYSTEM_ROOT</title>
    <link>https://stag-nant.github.io/</link>
    <guid>https://stag-nant.github.io/</guid>
    <description><![CDATA[  /* 1. ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item><item>
    <title>Expressway Writeup</title>
    <link>https://stag-nant.github.io/Expressway-Writeup</link>
    <guid>https://stag-nant.github.io/Expressway-Writeup</guid>
    <description><![CDATA[ Expressway — Hack The Box Writeup Machine Information: Author: Muhil M Name: Expressway Difficulty: Easy Operating System: Linux (Ubuntu 22.04.5 LTS) • TLDR Summary Expressway exposes only SSH on TCP but also leaks an IPsec/IKE service on UDP 500. ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item><item>
    <title>IDOR WRITEUP</title>
    <link>https://stag-nant.github.io/IDOR-WRITEUP</link>
    <guid>https://stag-nant.github.io/IDOR-WRITEUP</guid>
    <description><![CDATA[ Lab Write-Up: URL-based Access Control Can Be Circumvented Author: Muhil M Category: Access Control → Broken Access Control (IDOR-class behavior) Lab Difficulty: Practitioner Scope Target Lab: Web Security Academy (PortSwigger) Allowed Actions: All exploitation techniques (training environment) Tool... ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item><item>
    <title>SSRF WRITEUP</title>
    <link>https://stag-nant.github.io/SSRF-WRITEUP</link>
    <guid>https://stag-nant.github.io/SSRF-WRITEUP</guid>
    <description><![CDATA[ Lab Write-Up: SSRF With Filter Bypass via Open Redirection Author: Muhil M Category: Server-Side Request Forgery (SSRF) → Filter Bypass via Open Redirect Lab Difficulty: Practitioner Scope Target Lab: PortSwigger Web Security Academy Environment: Safe training instance Tools Used: Browser, Burp Suit... ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item><item>
    <title>CodePartTwo Writeup</title>
    <link>https://stag-nant.github.io/CodePartTwo-Writeup</link>
    <guid>https://stag-nant.github.io/CodePartTwo-Writeup</guid>
    <description><![CDATA[ HackTheBox - CodePartTwo Writeup Machine: CodePartTwo Difficulty: Easy OS: Linux IP Address: 10.10.11.82 Introduction CodePartTwo is an Easy-rated Linux machine on HackTheBox that focuses on: Web application enumeration JavaScript-to-Python (js2py) sandbox escape vulnerability (CVE-2024-28397) SQLit... ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item><item>
    <title>Conversor Writeup</title>
    <link>https://stag-nant.github.io/Conversor-Writeup</link>
    <guid>https://stag-nant.github.io/Conversor-Writeup</guid>
    <description><![CDATA[ Conversor — Hack The Box Writeup Machine Information: Author: Muhil M Name: Conversor Difficulty: Easy Operating System: Linux (Ubuntu 22.04.5 LTS) Key Vulnerabilities: XSLT Injection (EXSLT File Write), Cron Job Abuse, needrestart CVE-2024-48990 Prerequisites Before starting: HTB VPN connected Kali... ]]></description>
    <pubDate>Fri, 28 Nov 2025 03:06:55 GMT</pubDate>
  </item>
    </channel>
  </rss>