November 21, 2024

Lame

“When people are lame they always blame”

Table of Contents

About Lame

Lame is a very easy box that is retired. It is on TJ Null’s OSCP prep list.

Machine Info

Lame’s IP is 10.10.10.3. It has three ports open, and interestingly SMB is what we are looking at here

recon

Can use the following link to get the exploit. Let’s fire the exploit against the box. Start netcat.

Intrusion

We got a shell. Now we need to escalate privileges. I used both LinEnum and Linuxprivilegechecker for this box. LinEnum showed me MYSQL which I couldn’t exploit.

CVE-2004-2687

distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.

Privesc

For privesc we can just use nmap –interactive, an older version of nmap has this sudo permission

Leave a Reply

Your email address will not be published. Required fields are marked *