
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Sun, 30 Nov 2025 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/cron-abuse/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-Era-Writeup</guid>
      <title>Hack-The-Box - Medium - Linux - Era</title>
      <link>https://le0pard.vercel.app/blog/HTB-Era-Writeup</link>
      <description>HTB Era exposes FTP and HTTP. VHOST enumeration reveals file.era.htb with a vulnerable file manager. An IDOR leaks a full backup, SQLite DB, and OpenSSL keys. Cracked creds and an unsafe admin-only PHP wrapper enable RCE. Abusing security questions grants admin, and a signed cron-executed binary leads to root access.</description>
      <pubDate>Sun, 30 Nov 2025 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Season-8</category><category>Linux</category><category>Medium</category><category>IDOR</category><category>PHP</category><category>RCE</category><category>SUID</category><category>Lateral-Movement</category><category>Cronjob</category><category>Signed-Binary</category><category>PHP-Wrappers</category><category>OpenSSL</category><category>ssh2-wrapper</category><category>Insecure-Design</category><category>ELF-Signing</category><category>Secure-Coding</category><category>PEM-Key</category><category>Hash-Cracking</category><category>Cron-Abuse</category><category>Backup</category>
    </item>
  
      </channel>
    </rss>
  