
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Mon, 12 Jan 2026 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/terraform/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-Previous-Writeup</guid>
      <title>Hack-The-Box - Medium - Linux - Previous</title>
      <link>https://le0pard.vercel.app/blog/HTB-Previous-Writeup</link>
      <description>This writeup details exploiting a Next.js auth bypass (CVE-2025-29927) to access a restricted app, then leveraging an LFI vulnerability to extract credentials from internal files. After gaining SSH access, a Terraform misconfiguration with sudo privileges is abused to escalate to root and capture both user and root flags.</description>
      <pubDate>Mon, 12 Jan 2026 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Machines</category><category>Writeup</category><category>Non-Seasonal</category><category>Linux</category><category>Medium</category><category>WEB</category><category>Next.js</category><category>CVE-2025-29927</category><category>Authentication-Bypass</category><category>LFI</category><category>Terraform</category>
    </item>
  
      </channel>
    </rss>
  