<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.hawkeyesecurity.com/2019/05/11/getting-admin-access-to-an-uber-network-operations-system/</loc><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2019/05/screen-shot-2019-05-11-at-2.20.20-pm.png</image:loc><image:title>Screen Shot 2019-05-11 at 2.20.20 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2019/05/screen-shot-2019-05-11-at-2.19.32-pm.png</image:loc><image:title>Screen Shot 2019-05-11 at 2.19.32 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2019/05/arubaxxe-1.png</image:loc><image:title>arubaxxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2019/05/arubaxxe.png</image:loc><image:title>arubaxxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2019/05/aps.png</image:loc><image:title>APS</image:title></image:image><lastmod>2020-02-27T23:53:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/about/</loc><lastmod>2019-01-29T19:35:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.hawkeyesecurity.com/2018/08/27/traversing-the-path-to-rce/</loc><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/5-shelluploadtowebroot1.png</image:loc><image:title>5-ShellUploadToWebRoot</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/5-shelluploadtowebroot.png</image:loc><image:title>5-ShellUploadToWebRoot</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/4-pathtraversal.png</image:loc><image:title>4-PathTraversal</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/3-displayread-encrypted-file.png</image:loc><image:title>3-Display:Read Encrypted File</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/2-createencryptedfile.png</image:loc><image:title>2-CreateEncryptedFile</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/08/1-checkiffileexists.png</image:loc><image:title>1-CheckIfFileExists</image:title></image:image><lastmod>2018-08-27T23:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/2017/12/13/rce-via-spring-engine-ssti/</loc><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-13-at-2-37-15-pm.png</image:loc><image:title>Screen Shot 2017-11-13 at 2.37.15 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-13-at-10-38-02-am.png</image:loc><image:title>Screen Shot 2017-11-13 at 10.38.02 AM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-09-at-9-22-26-pm.png</image:loc><image:title>Screen Shot 2017-11-09 at 9.22.26 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-10-at-3-24-15-pm.png</image:loc><image:title>Screen Shot 2017-11-10 at 3.24.15 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-10-at-3-24-01-pm.png</image:loc><image:title>Screen Shot 2017-11-10 at 3.24.01 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-09-at-3-47-11-pm.png</image:loc><image:title>Screen Shot 2017-11-09 at 3.47.11 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-09-at-3-46-54-pm.png</image:loc><image:title>Screen Shot 2017-11-09 at 3.46.54 PM</image:title></image:image><lastmod>2018-07-09T22:18:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/2017/12/13/extracting-aws-metadata-via-ssrf-in-google-acquisition/</loc><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/apigeessrf2.png</image:loc><image:title>apigeessrf</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/apigeessrf1.png</image:loc><image:title>apigeessrf</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/apigeessrf.png</image:loc><image:title>apigeessrf</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-12-12-at-8-59-51-pm.png</image:loc><image:title>Screen Shot 2017-12-12 at 8.59.51 PM</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2017/12/screen-shot-2017-11-18-at-9-18-26-am.png</image:loc><image:title>Screen Shot 2017-11-18 at 9.18.26 AM</image:title></image:image><lastmod>2018-06-04T09:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/2018/03/24/gaining-filesystem-access-via-blind-oob-xxe/</loc><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/json1.png</image:loc><image:title>json</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/1xxe6.png</image:loc><image:title>1xxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/1xxe5.png</image:loc><image:title>1xxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/1xxe4.png</image:loc><image:title>1xxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/xxe71.png</image:loc><image:title>xxe7</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/1xxe3.png</image:loc><image:title>1xxe</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/json.png</image:loc><image:title>json</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/xxe7.png</image:loc><image:title>xxe7</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/xxe6.png</image:loc><image:title>xxe6</image:title></image:image><image:image><image:loc>https://blog.hawkeyesecurity.com/wp-content/uploads/2018/03/4xxe.png</image:loc><image:title>4xxe</image:title></image:image><lastmod>2018-04-19T05:12:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/2017/02/09/first-blog-post/</loc><lastmod>2017-12-13T05:38:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.hawkeyesecurity.com/contact/</loc><lastmod>2017-02-10T01:48:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.hawkeyesecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-02-27T23:53:04+00:00</lastmod></url></urlset>
