Skip to main content

Posts

Featured

HackTheBox-"Lame" [WRITE-UP] {EASY}

  HackTheBox Write-Up 'Lame' {EASY} 13 Mar 2024 ‘LAME’ HacktheBox HTB _ “Lame” _ Machine Write-Up/Report ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HTB link: https://app.hackthebox.com/machines/Lame \ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -→ MICHAEL(Nolkm) RECON scanning: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ *** IMPORTANT *** 21/tcp open ftp vsftpd 2.3.4 22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.0.20-Debian (workgroup: WORKGROUP) port 80 filtered SMB Enum Resources: https://book.hacktricks.xyz/network-services-pentesting/pentesting-smb These 2 ports are found to be open on the host system i wll connect with smb clint to see what information

Latest Posts

[Access Control] Lab 7: User ID controlled by request parameter with password disclosure

[Access Control] lab 6: User ID controlled by request parameter, with unpredictable user IDs

[Access Control] Lab 5: User role controlled by request parameter

[Access Control] Lab 4: Unprotected admin functionality with unpredictable URL

[Access Control] Lab 2: Unprotected admin functionality