{"id":72,"date":"2020-10-17T21:36:00","date_gmt":"2020-10-17T21:36:00","guid":{"rendered":"https:\/\/thecyberstaff.com\/?p=72"},"modified":"2025-12-13T21:37:51","modified_gmt":"2025-12-13T21:37:51","slug":"lame-hackthebox-lab","status":"publish","type":"post","link":"https:\/\/thecyberstaff.com\/?p=72","title":{"rendered":"Lame- Hackthebox lab"},"content":{"rendered":"\n<p>This is a writeup for Hackthebox Lame, this is my first HTB writeup.<\/p>\n\n\n\n<p><br>Started with an nmap scan against the target: 10.10.10.3<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image.png\" alt=\"\" class=\"wp-image-4556\"\/><\/figure>\n\n\n\n<p>The nmap scan results are below<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-5.png\" alt=\"\" class=\"wp-image-4561\"\/><\/figure>\n\n\n\n<p>A exploit was found for <strong>Samba 3.0.20-Debian<\/strong> in the nmap Host script results<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-4.png\" alt=\"\" class=\"wp-image-4560\"\/><\/figure>\n\n\n\n<p>Running the exploit in Metasploit opened a shell with root permissions&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-3-1024x138.png\" alt=\"\" class=\"wp-image-4559\"\/><\/figure>\n\n\n\n<p>Both user and root flags were collected by browsing around the file system<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-1.png\" alt=\"\" class=\"wp-image-4557\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-2.png\" alt=\"\" class=\"wp-image-4558\"\/><\/figure>\n\n\n\n<p>This box was pretty easy, no privilege escalation involved after getting access to the box.<\/p>\n\n\n\n<p>also grabbed the \/etc\/passswd and \/etc\/shadow files and used the unshadow utility to combine them.<\/p>\n\n\n\n<p><br>I then cracked the hashes with hashcat<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/thecyberstaff.com\/wp-content\/uploads\/2020\/10\/image-6.png\" alt=\"\" class=\"wp-image-4563\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This is a writeup for Hackthebox Lame, this is my first HTB writeup. Started with an nmap scan against the target: 10.10.10.3 The nmap scan results are below A exploit was found for Samba 3.0.20-Debian in the nmap Host script results Running the exploit in Metasploit opened a shell with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-72","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-pentesting"],"brizy_media":[],"_links":{"self":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/72","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=72"}],"version-history":[{"count":1,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/72\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=\/wp\/v2\/posts\/72\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=72"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=72"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecyberstaff.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}