A detailed penetration testing walkthrough of the HackTheBox CodePartTwo machine. The exploitation chain begins with discovering a vulnerable js2py 0.74 dependency (CVE-2024-28397) in a Flask web application, leading to remote code execution through a sandbox escape. After gaining initial access, credentials are extracted from
Table of contents
Initial ReconnaissanceAdding to host's fileNavigating the web appVulnerability researchExploitationGet Death Esther ’s stories in your inboxInitial post‑exploitation: user discoveryCredential discoveryLogging in as the userCapturing user flagPrivilege EscalationHow I escalated to rootCapturing the root flagConclusionSort: