{"version":"1.0","provider_name":"Building THE IT GUY","provider_url":"https:\/\/www.buildingtheitguy.com","author_name":"Mohamed Asath","author_url":"https:\/\/www.buildingtheitguy.com\/index.php\/author\/asathwebtieradmin\/","title":"HTB Knife Walkthrough - Building THE IT GUY","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"7th9tBpo1U\"><a href=\"https:\/\/www.buildingtheitguy.com\/index.php\/htb-knife-walkthrough\/cybersecurity\/\">HTB Knife Walkthrough<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.buildingtheitguy.com\/index.php\/htb-knife-walkthrough\/cybersecurity\/embed\/#?secret=7th9tBpo1U\" width=\"600\" height=\"338\" title=\"&#8220;HTB Knife Walkthrough&#8221; &#8212; Building THE IT GUY\" data-secret=\"7th9tBpo1U\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.buildingtheitguy.com\/wp-content\/uploads\/2021\/10\/knife-HTB.jpeg","thumbnail_width":1400,"thumbnail_height":787,"description":"Knife is a Linux machine, we are going to attack by scanning, enumerating, privilege escalation, and gaining access to the server. IP: 10.10.10.242 Connect HTB VPN and make sure you can reach this machine. If you want to connect HTP VPN check here Enumeration Scan the host by using the NMAP scanner. we can see [&hellip;]"}