<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on KinJih's space</title><link>https://kinjih.github.io/posts/</link><description>Recent content in Posts on KinJih's space</description><generator>Hugo -- gohugo.io</generator><language>zh-tw</language><copyright>© 2026 KinJih</copyright><lastBuildDate>Mon, 10 Jun 2024 22:02:04 +0800</lastBuildDate><atom:link href="https://kinjih.github.io/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB Sherlock Unit42 Writeup</title><link>https://kinjih.github.io/posts/htb+sherlock+unit42+writeup/</link><pubDate>Mon, 10 Jun 2024 22:02:04 +0800</pubDate><guid>https://kinjih.github.io/posts/htb+sherlock+unit42+writeup/</guid><description>HackTheBox Sherlock Unit42 調查紀錄，透過 Sysmon 事件還原惡意下載、落地檔案與 UltraVNC 感染流程。</description></item><item><title>HTB Sherlock Brutus Writeup</title><link>https://kinjih.github.io/posts/htb+sherlock+brutus+writeup/</link><pubDate>Sat, 11 May 2024 21:50:07 +0800</pubDate><guid>https://kinjih.github.io/posts/htb+sherlock+brutus+writeup/</guid><description>HackTheBox Sherlock Brutus 調查紀錄，透過 auth.log 與 wtmp 還原 SSH 暴力破解、持久化與後續行為。</description></item><item><title>CGGC CTF 2023 初賽 Writeup</title><link>https://kinjih.github.io/posts/cggc+ctf+2023+writeup/</link><pubDate>Sat, 09 Dec 2023 17:06:08 +0800</pubDate><guid>https://kinjih.github.io/posts/cggc+ctf+2023+writeup/</guid><description>CGGC CTF 2023 初賽解題紀錄，包含 Web、Misc、Reverse 題目的分析流程與 payload。</description></item><item><title>Progress WS_FTP Server RCE (CVE-2023-40044)</title><link>https://kinjih.github.io/posts/progress+ws_ftp+server+rce-cve-2023-40044/</link><pubDate>Sun, 08 Oct 2023 14:24:16 +0800</pubDate><guid>https://kinjih.github.io/posts/progress+ws_ftp+server+rce-cve-2023-40044/</guid><description>分析 Progress WS_FTP Server Ad Hoc Transfer 模組中的 .NET 反序列化漏洞，說明未授權 RCE 的觸發路徑與 PoC。</description></item></channel></rss>