<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>KinJih's space</title><link>https://kinjih.github.io/en/</link><description>Recent content on KinJih's space</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 KinJih</copyright><lastBuildDate>Mon, 10 Jun 2024 22:02:04 +0800</lastBuildDate><atom:link href="https://kinjih.github.io/en/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB Sherlock Unit42 Writeup</title><link>https://kinjih.github.io/en/posts/htb+sherlock+unit42+writeup/</link><pubDate>Mon, 10 Jun 2024 22:02:04 +0800</pubDate><guid>https://kinjih.github.io/en/posts/htb+sherlock+unit42+writeup/</guid><description>A HackTheBox Sherlock Unit42 investigation walkthrough using Sysmon events to reconstruct malicious download, dropped files, and the UltraVNC infection flow.</description></item><item><title>HTB Sherlock Brutus Writeup</title><link>https://kinjih.github.io/en/posts/htb+sherlock+brutus+writeup/</link><pubDate>Sat, 11 May 2024 21:50:07 +0800</pubDate><guid>https://kinjih.github.io/en/posts/htb+sherlock+brutus+writeup/</guid><description>A HackTheBox Sherlock Brutus investigation walkthrough using auth.log and wtmp to reconstruct SSH brute force, persistence, and follow-up attacker activity.</description></item><item><title>CGGC CTF 2023 Preliminary Writeup</title><link>https://kinjih.github.io/en/posts/cggc+ctf+2023+writeup/</link><pubDate>Sat, 09 Dec 2023 17:06:08 +0800</pubDate><guid>https://kinjih.github.io/en/posts/cggc+ctf+2023+writeup/</guid><description>A writeup for the CGGC CTF 2023 preliminary round, covering Web, Misc, and Reverse challenges with analysis notes and payloads.</description></item><item><title>Progress WS_FTP Server RCE (CVE-2023-40044)</title><link>https://kinjih.github.io/en/posts/progress+ws_ftp+server+rce-cve-2023-40044/</link><pubDate>Sun, 08 Oct 2023 14:24:16 +0800</pubDate><guid>https://kinjih.github.io/en/posts/progress+ws_ftp+server+rce-cve-2023-40044/</guid><description>An analysis of the .NET deserialization flaw in Progress WS_FTP Server&amp;rsquo;s Ad Hoc Transfer module, covering the unauthenticated RCE trigger path and PoC.</description></item><item><title>About Me</title><link>https://kinjih.github.io/en/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kinjih.github.io/en/about/</guid><description>&lt;p&gt;Terminal procrastinator.&lt;/p&gt;</description></item></channel></rss>