<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Silentium on H4CK R007</title>
    <link>https://h4ckr00t.com/tags/silentium/</link>
    <description>Recent content in Silentium on H4CK R007</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 17:02:40 +0300</lastBuildDate>
    <atom:link href="https://h4ckr00t.com/tags/silentium/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HacktheBox - Silentium</title>
      <link>https://h4ckr00t.com/posts/silentium/</link>
      <pubDate>Fri, 17 Apr 2026 17:02:40 +0300</pubDate>
      <guid>https://h4ckr00t.com/posts/silentium/</guid>
      <description>Silentium HTB Machine Writeup Introduction Silentium is a challenging machine that requires a combination of web application exploitation and local privilege escalation techniques. The attack chain involves exploiting a password reset token disclosure vulnerability to gain access to a user account, then leveraging an API key disclosure to execute a remote code execution exploit against the Flowise AI platform. Finally, we used the obtained access to enumerate the system and find another vulnerable service (GOGS) to gain root access and capture the flag.</description>
    </item>
  </channel>
</rss>
