HTB: CodeTwo
0xdf.gitlab.io·3d
🏠Self Hosting
Preview
Report Post

CodeTwo is a Linux box hosting a developer sandbox where users can execute JavaScript code. The site uses js2py, which I’ll exploit via CVE-2024-28397 to escape the sandbox and get remote code execution. From there, I’ll find MD5 password hashes in the SQLite database and crack one to pivot to marco. Marco can run npbackup-cli with sudo, and I’ll abuse this to read files from root’s backup, including the SSH private key, which I’ll use to get a shell as root.

Box Info

Rated Difficulty

Radar Graph

User

00:03:02

Root

00:06:48

Creator

Recon

Initial Scanning

nmap finds two open TCP ports, SSH (22) and HTTP (8000):

oxdf@hacky$ nmap -p- -vvv --min-rate 10000 10.10.11.82
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-17 18:22 UTC
...[snip]...
Nmap scan ...

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help