{"id":88,"date":"2024-11-13T08:58:17","date_gmt":"2024-11-13T00:58:17","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=88"},"modified":"2024-11-13T09:52:40","modified_gmt":"2024-11-13T01:52:40","slug":"htb_machine_lame","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2024\/11\/13\/htb_machine_lame\/","title":{"rendered":"HTB\u9776\u673a Lame \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code>10.10.10.3<\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">\u250c\u2500\u2500(root\u327fattacker)-[\/home\/hacker\/Documents\/vulnhub_notes\/lame]\n\u2514\u2500# ping -c 4 10.10.10.3\nPING 10.10.10.3 (10.10.10.3) 56(84) bytes of data.\n64 bytes from 10.10.10.3: icmp_seq=1 ttl=63 time=230 ms\n64 bytes from 10.10.10.3: icmp_seq=2 ttl=63 time=235 ms\n64 bytes from 10.10.10.3: icmp_seq=3 ttl=63 time=237 ms\n64 bytes from 10.10.10.3: icmp_seq=4 ttl=63 time=221 ms\n\n--- 10.10.10.3 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3003ms\nrtt min\/avg\/max\/mdev = 221.400\/230.673\/236.528\/5.891 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u4e4b\u95f4\u901a\u4fe1\u72b6\u6001\u826f\u597d\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu May 30 06:25:17 2024 as: nmap -sA -p- --min-rate 1000 -oN .\/ack_report.txt 10.10.10.3\nNmap scan report for 10.10.10.3 (10.10.10.3)\nHost is up (0.23s latency).\nNot shown: 65530 filtered tcp ports (no-response)\nPORT     STATE      SERVICE\n21\/tcp   unfiltered ftp\n22\/tcp   unfiltered ssh\n139\/tcp  unfiltered netbios-ssn\n445\/tcp  unfiltered microsoft-ds\n3632\/tcp unfiltered distccd\n\n# Nmap done at Thu May 30 06:27:29 2024 -- 1 IP address (1 host up) scanned in 131.85 seconds<\/code><\/pre>\n<p>\u9776\u673a\u53ef\u80fd\u5f00\u653e\u4e86<code>5<\/code>\u4e2a\u7aef\u53e3\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code>TCP<\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu May 30 06:26:47 2024 as: nmap -sS -sV -A -p- --min-rate 1000 -oN .\/tcp_result.txt 10.10.10.3\nNmap scan report for 10.10.10.3 (10.10.10.3)\nHost is up (0.23s latency).\nNot shown: 65530 filtered tcp ports (no-response)\nPORT     STATE SERVICE     VERSION\n21\/tcp   open  ftp         vsftpd 2.3.4\n|_ftp-anon: Anonymous FTP login allowed (FTP code 230)\n| ftp-syst: \n|   STAT: \n| FTP server status:\n|      Connected to 10.10.14.43\n|      Logged in as ftp\n|      TYPE: ASCII\n|      No session bandwidth limit\n|      Session timeout in seconds is 300\n|      Control connection is plain text\n|      Data connections will be plain text\n|      vsFTPd 2.3.4 - secure, fast, stable\n|_End of status\n22\/tcp   open  ssh         OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)\n| ssh-hostkey: \n|   1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)\n|_  2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA)\n139\/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)\n445\/tcp  open  netbios-ssn Samba smbd 3.0.20-Debian (workgroup: WORKGROUP)\n3632\/tcp open  distccd     distccd v1 ((GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4))\nWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port\nAggressive OS guesses: Linux 2.6.23 (92%), Belkin N300 WAP (Linux 2.6.30) (90%), Control4 HC-300 home controller (90%), D-Link DAP-1522 WAP, or Xerox WorkCentre Pro 245 or 6556 printer (90%), Dell Integrated Remote Access Controller (iDRAC5) (90%), Dell Integrated Remote Access Controller (iDRAC6) (90%), Linksys WET54GS5 WAP, Tranzeo TR-CPQ-19f WAP, or Xerox WorkCentre Pro 265 printer (90%), Linux 2.4.21 - 2.4.31 (likely embedded) (90%), Linux 2.4.7 (90%), Citrix XenServer 5.5 (Linux 2.6.18) (90%)\nNo exact OS matches for host (test conditions non-ideal).\nNetwork Distance: 2 hops\nService Info: OSs: Unix, Linux; CPE: cpe:\/o:linux:linux_kernel\n\nHost script results:\n| smb-security-mode: \n|   account_used: &lt;blank&gt;\n|   authentication_level: user\n|   challenge_response: supported\n|_  message_signing: disabled (dangerous, but default)\n| smb-os-discovery: \n|   OS: Unix (Samba 3.0.20-Debian)\n|   Computer name: lame\n|   NetBIOS computer name: \n|   Domain name: hackthebox.gr\n|   FQDN: lame.hackthebox.gr\n|_  System time: 2024-05-29T06:00:08-04:00\n|_clock-skew: mean: -10h29m09s, deviation: 2h49m44s, median: -12h29m11s\n|_smb2-time: Protocol negotiation failed (SMB2)\n\nTRACEROUTE (using port 21\/tcp)\nHOP RTT       ADDRESS\n1   225.85 ms 10.10.14.1 (10.10.14.1)\n2   225.83 ms 10.10.10.3 (10.10.10.3)\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Thu May 30 06:29:58 2024 -- 1 IP address (1 host up) scanned in 191.01 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu May 30 06:18:20 2024 as: nmap -sU -p- --min-rate 2000 -oN .\/udp_ports_result.txt 10.10.10.3\nNmap scan report for 10.10.10.3 (10.10.10.3)\nHost is up (0.22s latency).\nNot shown: 65531 open|filtered udp ports (no-response)\nPORT     STATE  SERVICE\n22\/udp   closed ssh\n139\/udp  closed netbios-ssn\n445\/udp  closed microsoft-ds\n3632\/udp closed distcc\n\n# Nmap done at Thu May 30 06:19:27 2024 -- 1 IP address (1 host up) scanned in 66.41 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu May 30 06:20:54 2024 as: nmap -sC -sU -sV -p 22,139,445,3632 -oN .\/udp_result.txt 10.10.10.3\nNmap scan report for 10.10.10.3 (10.10.10.3)\nHost is up (0.23s latency).\n\nPORT     STATE  SERVICE      VERSION\n22\/udp   closed ssh\n139\/udp  closed netbios-ssn\n445\/udp  closed microsoft-ds\n3632\/udp closed distcc\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Thu May 30 06:21:00 2024 -- 1 IP address (1 host up) scanned in 6.13 seconds<\/code><\/pre>\n<p><strong>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u7248\u672c\u4e3a<\/strong><code>Debian Linux<\/code><strong>\uff0c\u5185\u6838\u7248\u672c\u5927\u81f4\u4e3a<\/strong><code>Linux 2.6.23<\/code><strong>\uff0c\u57df\u540d\u4e3a<\/strong><code>lame.hackthebox.gr<\/code><strong>\u3002<\/strong><\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>SSH\u670d\u52a1\uff0822\u7aef\u53e3\uff09<\/h2>\n<p>\u7aef\u53e3<code>Banner<\/code>\uff1a<\/p>\n<pre><code class=\"language-plain\">\u250c\u2500\u2500(root\u327fattacker)-[\/home\/hacker\/Documents\/vulnhub_notes\/lame]\n\u2514\u2500# nc -nv 10.10.10.3 22\n(UNKNOWN) [10.10.10.3] 22 (ssh) open\nSSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1<\/code><\/pre>\n<h2>FTP\u670d\u52a1\uff0821\u7aef\u53e3\uff09<\/h2>\n<p>\u53d1\u73b0<code>FTP<\/code>\u670d\u52a1\u7248\u672c\u4e3a<code>vsftpd 2.3.4<\/code>\uff0c\u5b58\u5728\u8457\u540d\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\uff0c\u5c1d\u8bd5\u4f7f\u7528<code>Metasploit<\/code>\u653b\u51fb\uff0c\u5931\u8d25\u3002<\/p>\n<p>\u5c1d\u8bd5\u8fdb\u884c<code>FTP<\/code>\u533f\u540d\u767b\u5f55\uff0c\u6210\u529f\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/jpeg\/42816956\/1717106507218-05834411-4f86-414e-861b-7e4d009dbe9f.jpeg\" alt=\"\" \/><\/p>\n<p>\u4f46\u53d1\u73b0\u5171\u4eab\u7684\u6587\u4ef6\u5939\u5185\u6ca1\u6709\u4efb\u4f55\u6587\u4ef6\u3002<\/p>\n<h2>SMB\u670d\u52a1<\/h2>\n<p>\u4f7f\u7528<code>nbtscan<\/code>\u786e\u8ba4<code>SMB<\/code>\u670d\u52a1\u4fe1\u606f\uff1a<\/p>\n<pre><code class=\"language-shell\">\u250c\u2500\u2500(root\u327fattacker)-[\/home\/hacker\/Documents\/vulnhub_notes\/lame]\n\u2514\u2500# nbtscan 10.10.10.3        \nDoing NBT name scan for addresses from 10.10.10.3\n\nIP address       NetBIOS Name     Server    User             MAC address      \n------------------------------------------------------------------------------<\/code><\/pre>\n<p>\u6ca1\u6709\u8fd4\u56de\u5173\u952e\u4fe1\u606f\u3002<\/p>\n<p>\u53d1\u73b0\u8be5<code>SMB<\/code>\u670d\u52a1\u5b58\u5728\u547d\u4ee4\u6267\u884c\u6f0f\u6d1e\u3002<\/p>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<p>\u5c1d\u8bd5\u4f7f\u7528<code>Metasploit<\/code>\u653b\u51fb\uff0c\u6210\u529f\uff0c\u7528\u6237\u4e3a<code>root<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/jpeg\/42816956\/1717108203628-91f6b500-8744-4e10-af05-528e9593c529.jpeg\" alt=\"\" \/><\/p>\n<hr \/>\n<h1>Flag\u6587\u4ef6\u5c55\u793a<\/h1>\n<pre><code class=\"language-plain\">3407188d395160c5830905dab4fc3c53<\/code><\/pre>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.10.3 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b \u250c\u2500\u2500(root\u327fattacker)-[\/home\/hacker &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,14],"tags":[],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-linux_machines"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":2,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"predecessor-version":[{"id":90,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/88\/revisions\/90"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}