img/genetic.png

💻 ~/Rooted_Tales 🌐

⚠️ Disclaimer: All writeups and code shared here are meant for educational and ethical hacking purposes only. Use at your own risk.

CodeTwo

CodeTwo is a HackTheBox machine featuring a vulnerable web application with JavaScript execution functionality leading to full system compromise through CVE exploitation and backup tool abuse.

Box Info

NameCodeTwo
TypeMachine
DifficultyEasy
CreatorFisMatHack
Release Date16 August 2025
Linkhttps://app.hackthebox.com/machines/CodeTwo
MY HTB Profilehttps://app.hackthebox.com/profile/1601323

Reconnaissance

Initial Enumeration

Performed Nmap scan and identified 2 open ports 22 and 8000

The Magic Informer

The Magic Informer is a HackTheBox challenge featuring a Node.js application with multiple critical vulnerabilities. This writeup demonstrates how I chained LFI, JWT bypass, and SSRF to achieve RCE.

Box Info

NameThe Magic Informer
TypeChallenge
DifficultyEasy
CreatorRayhan0x01 & makelaris
Release Date17 December 2022

Reconnaissance

Application Overview

The web application features:

HTB Passman

Passman is an easy-rated HackTheBox machine featuring a Node.js password manager vulnerable to IDOR via GraphQL mutations. This writeup demonstrates how I exploited an authorization flaw to change admin passwords and retrieve the flag.

Box Info

NamePassman
OSLinux
DifficultyEasy
Creatorxclow3n
Release Date27 Oct 2022

Reconnaissance

Application Overview

The web application presents a password manager interface:

Hijacking Sessions with postMessage: The Silent DOM XSS Threat

Discovery Date: 18th May 2025

Vulnerability Diagram

Credits to dall-efree.com

Introduction

Imagine a bank teller who accepts withdrawal slips from anyone without checking IDs. A hacker slips in a fake note saying, “Give all money to me,” and the teller blindly obeys.

gif

Credits to: tenor.com

That’s exactly what happens in this DOM XSS vulnerability — where a website blindly trusts messages from any sender, allowing attackers to inject malicious scripts.

CVE-2017-3506 : OS Command Injection in Alibaba WebLogic

Discovery Date: 16th July 2024

/posts/alibaba-cve-2017-3506/img/3.png

Vulnerability Overview

CVE-2017-3506 is a critical vulnerability in Oracle WebLogic Server (WLS) components that allowed unauthenticated remote code execution via malformed XML data in WLS Security subcomponent. During a penetration test of Alibaba’s infrastructure, I identified and exploited this vulnerability to gain server access.

Affected Systems

ComponentVersion
WebLogic Server10.3.6.0
WebLogic Server12.1.3.0
WebLogic Server12.2.1.0-12.2.1.2

Discovery Methodology

Initial Reconnaissance

Identified WebLogic servers using:

HTB: TwoMillion

TwoMillion is a special release from HackTheBox to celebrate 2,000,000 HackTheBox members. It released directly to retired, so no points and no bloods, just for run. It features a website that looks like the original HackTheBox platform, including the original invite code challenge that needed to be solved in order to register. Once registered, I’ll enumerate the API to find an endpoint that allows me to become an administrator, and then find a command injection in another admin endpoint. I’ll use database creds to pivot to the next user, and a kernel exploit to get to root. In Beyond Root, I’ll look at another easter egg challenge with a thank you message, and a YouTube video exploring the webserver and it’s vulnerabilities.