A detailed penetration testing walkthrough of the HackTheBox CodePartTwo machine. The exploitation chain begins with discovering a vulnerable js2py 0.74 dependency (CVE-2024-28397) in a Flask web application, leading to remote code execution through a sandbox escape. After gaining initial access, credentials are extracted from

5m read timeFrom infosecwriteups.com
Post cover image
Table of contents
Initial ReconnaissanceAdding to host's fileNavigating the web appVulnerability researchExploitationGet Death Esther ’s stories in your inboxInitial post‑exploitation: user discoveryCredential discoveryLogging in as the userCapturing user flagPrivilege EscalationHow I escalated to rootCapturing the root flagConclusion

Sort: