<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FLame</id>
	<title>Write-ups/HTB/Lame - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FHTB%2FLame"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/Lame&amp;action=history"/>
	<updated>2026-04-21T15:10:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Write-ups/HTB/Lame&amp;diff=1171&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 20:44, 3 January 2022</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/HTB/Lame&amp;diff=1171&amp;oldid=prev"/>
		<updated>2022-01-03T20:44:05Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox WriteUp&lt;br /&gt;
| name = Lame&lt;br /&gt;
| platform = HackTheBox&lt;br /&gt;
| os = Linux&lt;br /&gt;
| difficulty = Easy&lt;br /&gt;
| techniques = Samba, distcc&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-image-75.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is the first box for my OSCP preparation. This is a pretty straight forward box, where there are multiple vulnerabilites that can be used, as well as some privilege escalation vectors. I&amp;#039;ll look at two different vulnerabilites in this writeup. Even though metasploit is only allowed once on the OSCP exam, I will strictly use metasploit in this writeup as a warmup. For further boxes I will refrain from using metasploit.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As always I&amp;#039;ll start with the enumeration using NMAP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
┌─[root@parrotos]─[/home/aghanim/Desktop/HTB/lame]&lt;br /&gt;
└──╼ #nmap -sV -sC -p- --min-rate 10000 10.10.10.3 -oN nmap.result&lt;br /&gt;
Starting Nmap 7.92 ( https://nmap.org ) at 2022-01-03 19:13 GMT&lt;br /&gt;
Stats: 0:00:57 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan&lt;br /&gt;
SYN Stealth Scan Timing: About 50.00% done; ETC: 19:15 (0:00:51 remaining)&lt;br /&gt;
Nmap scan report for 10.10.10.3&lt;br /&gt;
Host is up (0.082s latency).&lt;br /&gt;
Not shown: 65530 filtered tcp ports (no-response)&lt;br /&gt;
PORT     STATE SERVICE     VERSION&lt;br /&gt;
21/tcp   open  ftp         vsftpd 2.3.4&lt;br /&gt;
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)&lt;br /&gt;
| ftp-syst:&lt;br /&gt;
|   STAT:&lt;br /&gt;
| FTP server status:&lt;br /&gt;
|      Connected to 10.10.14.11&lt;br /&gt;
|      Logged in as ftp&lt;br /&gt;
|      TYPE: ASCII&lt;br /&gt;
|      No session bandwidth limit&lt;br /&gt;
|      Session timeout in seconds is 300&lt;br /&gt;
|      Control connection is plain text&lt;br /&gt;
|      Data connections will be plain text&lt;br /&gt;
|      vsFTPd 2.3.4 - secure, fast, stable&lt;br /&gt;
|_End of status&lt;br /&gt;
22/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)&lt;br /&gt;
| ssh-hostkey:&lt;br /&gt;
|   1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)&lt;br /&gt;
|_  2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)&lt;br /&gt;
139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)&lt;br /&gt;
445/tcp  open  netbios-ssn Samba smbd 3.0.20-Debian (workgroup: WORKGROUP)&lt;br /&gt;
3632/tcp open  distccd     distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))&lt;br /&gt;
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel&lt;br /&gt;
&lt;br /&gt;
Host script results:&lt;br /&gt;
|_clock-skew: mean: 2h32m23s, deviation: 3h32m11s, median: 2m20s&lt;br /&gt;
| smb-security-mode:&lt;br /&gt;
|   account_used: guest&lt;br /&gt;
|   authentication_level: user&lt;br /&gt;
|   challenge_response: supported&lt;br /&gt;
|_  message_signing: disabled (dangerous, but default)&lt;br /&gt;
| smb-os-discovery:&lt;br /&gt;
|   OS: Unix (Samba 3.0.20-Debian)&lt;br /&gt;
|   Computer name: lame&lt;br /&gt;
|   NetBIOS computer name:&lt;br /&gt;
|   Domain name: hackthebox.gr&lt;br /&gt;
|   FQDN: lame.hackthebox.gr&lt;br /&gt;
|_  System time: 2022-01-03T14:18:06-05:00&lt;br /&gt;
|_smb2-time: Protocol negotiation failed (SMB2)&lt;br /&gt;
&lt;br /&gt;
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .&lt;br /&gt;
Nmap done: 1 IP address (1 host up) scanned in 156.59 seconds&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are some ports that run vulnerable services on them, such as &amp;#039;&amp;#039;&amp;#039;VSFTPD 2.3.4&amp;#039;&amp;#039;&amp;#039;, &amp;#039;&amp;#039;&amp;#039;smbd 3.0.20&amp;#039;&amp;#039;&amp;#039; and &amp;#039;&amp;#039;&amp;#039;distccd v1&amp;#039;&amp;#039;&amp;#039;. I&amp;#039;ll first look at smbd and then distccd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Initial Acces - Alternative 1 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CVE-2007-2447 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Starting metasploit I&amp;#039;ll use &amp;#039;&amp;#039;&amp;#039;multi/samba/usermap_script&amp;#039;&amp;#039;&amp;#039; with these options.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-image-77.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Running the exploit you can see that I instantly get root shell, so no need for privilege escalation. This is however very rare.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-image-76.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Initial Access - Alternative 2 ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CVE-2004-2687 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here I&amp;#039;ll also use metasploit &amp;#039;&amp;#039;&amp;#039;multi/misc/distcc_exec &amp;#039;&amp;#039;&amp;#039;with these options.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-Pasted-image-20220103205853.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
And running this exploit I&amp;#039;ll get a shell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-Pasted-image-20220103210005.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Root ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To get root access, I&amp;#039;ll search for files with SUID bits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
daemon@lame:/tmp$ find / -type f -perm -04000 -ls 2&amp;gt;/dev/null&lt;br /&gt;
find / -type f -perm -04000 -ls 2&amp;gt;/dev/null&lt;br /&gt;
 16466   68 -rwsr-xr-x   1 root     root        63584 Apr 14  2008 /bin/umount&lt;br /&gt;
 16449   20 -rwsr-xr--   1 root     fuse        20056 Feb 26  2008 /bin/fusermount&lt;br /&gt;
 16398   28 -rwsr-xr-x   1 root     root        25540 Apr  2  2008 /bin/su&lt;br /&gt;
 16418   84 -rwsr-xr-x   1 root     root        81368 Apr 14  2008 /bin/mount&lt;br /&gt;
 16427   32 -rwsr-xr-x   1 root     root        30856 Dec 10  2007 /bin/ping&lt;br /&gt;
 16457   28 -rwsr-xr-x   1 root     root        26684 Dec 10  2007 /bin/ping6&lt;br /&gt;
  8370   68 -rwsr-xr-x   1 root     root        65520 Dec  2  2008 /sbin/mount.nfs&lt;br /&gt;
304747    4 -rwsr-xr--   1 root     dhcp         2960 Apr  2  2008 /lib/dhcp3-client/call-dhclient-script&lt;br /&gt;
344359  112 -rwsr-xr-x   2 root     root       107776 Feb 25  2008 /usr/bin/sudoedit&lt;br /&gt;
344440    8 -rwsr-sr-x   1 root     root         7460 Jun 25  2008 /usr/bin/X&lt;br /&gt;
344958   12 -rwsr-xr-x   1 root     root         8524 Nov 22  2007 /usr/bin/netkit-rsh&lt;br /&gt;
344139   40 -rwsr-xr-x   1 root     root        37360 Apr  2  2008 /usr/bin/gpasswd&lt;br /&gt;
344317   16 -rwsr-xr-x   1 root     root        12296 Dec 10  2007 /usr/bin/traceroute6.iputils&lt;br /&gt;
344359  112 -rwsr-xr-x   2 root     root       107776 Feb 25  2008 /usr/bin/sudo&lt;br /&gt;
344959   12 -rwsr-xr-x   1 root     root        12020 Nov 22  2007 /usr/bin/netkit-rlogin&lt;br /&gt;
344230   12 -rwsr-xr-x   1 root     root        11048 Dec 10  2007 /usr/bin/arping&lt;br /&gt;
344231   40 -rwsr-sr-x   1 daemon   daemon      38464 Feb 20  2007 /usr/bin/at&lt;br /&gt;
344365   20 -rwsr-xr-x   1 root     root        19144 Apr  2  2008 /usr/bin/newgrp&lt;br /&gt;
344429   28 -rwsr-xr-x   1 root     root        28624 Apr  2  2008 /usr/bin/chfn&lt;br /&gt;
344956  768 -rwsr-xr-x   1 root     root       780676 Apr  8  2008 /usr/bin/nmap&lt;br /&gt;
344441   24 -rwsr-xr-x   1 root     root        23952 Apr  2  2008 /usr/bin/chsh&lt;br /&gt;
344957   16 -rwsr-xr-x   1 root     root        15952 Nov 22  2007 /usr/bin/netkit-rcp&lt;br /&gt;
344771   32 -rwsr-xr-x   1 root     root        29104 Apr  2  2008 /usr/bin/passwd&lt;br /&gt;
344792   48 -rwsr-xr-x   1 root     root        46084 Mar 31  2008 /usr/bin/mtr&lt;br /&gt;
354632   16 -rwsr-sr-x   1 libuuid  libuuid     12336 Mar 27  2008 /usr/sbin/uuidd&lt;br /&gt;
354626  268 -rwsr-xr--   1 root     dip        269256 Oct  4  2007 /usr/sbin/pppd&lt;br /&gt;
369987    8 -rwsr-xr--   1 root     telnetd      6040 Dec 17  2006 /usr/lib/telnetlogin&lt;br /&gt;
385106   12 -rwsr-xr--   1 root     www-data    10276 Mar  9  2010 /usr/lib/apache2/suexec&lt;br /&gt;
386116    8 -rwsr-xr-x   1 root     root         4524 Nov  5  2007 /usr/lib/eject/dmcrypt-get-device&lt;br /&gt;
377149  168 -rwsr-xr-x   1 root     root       165748 Apr  6  2008 /usr/lib/openssh/ssh-keysign&lt;br /&gt;
371390   12 -rwsr-xr-x   1 root     root         9624 Aug 17  2009 /usr/lib/pt_chown&lt;br /&gt;
  8415   16 -r-sr-xr-x   1 root     root        14320 Nov  3  2020 /usr/lib/vmware-tools/bin64/vmware-user-suid-wrapper&lt;br /&gt;
 16687   12 -r-sr-xr-x   1 root     root         9532 Nov  3  2020 /usr/lib/vmware-tools/bin32/vmware-user-suid-wrapper&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking through the list, there is one interesting file in particular; &amp;#039;&amp;#039;&amp;#039;nmap. &amp;#039;&amp;#039;&amp;#039;Looking at GTFObins I can run  the command &amp;lt;code&amp;gt;nmap --interactive &amp;lt;/code&amp;gt;and retain root privilege.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:2022-01-Pasted-image-20220103210251.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
[[Category:HackTheBox]]&lt;br /&gt;
[[Category:Linux]]&lt;br /&gt;
[[Category:Write-ups]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>