<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 04 May 2026 21:25:40 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/fourandsix-1hackerchallenges/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[FourAndSix:1  CTF Hacking Challenge Walkthrough (Vulnhub)]]></title><description><![CDATA[FourAndSix is a capture the flag challenge available at Vulnhub. As usual, the box grabbed an IP address on boot since DHCP is enabled: In my case the IP address was 192.168.10.100 If you are not sure]]></description><link>http://direct.ecency.com/bestfourandsix-1hackingchallenges/@twr/fourandsix1ctfhackingchallengewalkthroughvulnhub-vxct4ytvwp</link><guid isPermaLink="true">http://direct.ecency.com/bestfourandsix-1hackingchallenges/@twr/fourandsix1ctfhackingchallengewalkthroughvulnhub-vxct4ytvwp</guid><category><![CDATA[bestfourandsix-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 14 Nov 2018 10:07:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNYnhfeAYBj8aUdhSAdAFg?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>