Lame Box From HTB
Lame box was relatively an easy box, it’s considered one of the easiest boxes on HTB and was launched in the beginning of HTB.
Tools we are gonna use in this box are :
ping
Nmap
Metasploit
SearchSploit
Starting with Any box and any penetration testing procedure we start with information gathering.
Information gathering : is as the title states it’s the process of hunting and scanning the target and gathering as much information as possible for future exploitation and penetration it’s vital step and crucial in every hacking flow.
PHASE #1 of the ATTACK: Info Gathering.
Lets first try if we can reach the box and communicate.
First of all lets ping the box with ping tool
lets start with nmap scan :
nmap -sV -O -F — version-light 10.10.10.3
- sV — Service / Version Detection : Probe open ports to determine service/version info
- -O — OS Detection : Enable OS detection
- -F Fast Mode: Scan fewer ports than the default scan
By looking at the scan above we find multiple could-be vulnerable services that are worth checking out.
Open Ports
21 FTP
22 SSH
139 SAMBA netbios-ssn
445 SAMBA netbios-ssn
PHASE #2 of the ATTACK : Looking for vulnerable services to exploit.
Vulnerable services :
In this section we are gonna use Searchsploit for searching for vulnerabilites and exploits for the first open service and port 21 FTP
Lets use SearchSploit to search for the version :
Samba 3.0.20 has “username map script” vulnerability. Let us use this vulnerability to exploit this machine.
PHASE #3 of the ATTACK : exploiting Samba vulnerability we found
The vulnerability states thats module exploits a command execution vulnerability in Samba
versions 3.0.20 through 3.0.25rc3 when using the non-default
“username map script” configuration option. By specifying a username
containing shell meta characters, attackers can execute arbitrary
commands. No authentication is needed to exploit this vulnerability
since this option is used to map usernames prior to authentication!
By using Metasploit we can search for either CVE or services and their corresponding vulnerabilities and exploits.
msf5 > use exploit/multi/samba/usermap_script
Lets check who are we on the system.
We directly got root from one exploit that’s pretty damn easy.
Lets get the flag and run away
Now user!
Conclusion:
The box was relatively old and easy, that didn’t take much effort until next time tune in for more !
Thanks for Reading.