<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Write-Up on &gt;_ shell this box</title><link>http://shellthisbox.io/tags/write-up/</link><description>Recent content in Write-Up on &gt;_ shell this box</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 31 Mar 2026 12:01:35 +0300</lastBuildDate><atom:link href="http://shellthisbox.io/tags/write-up/index.xml" rel="self" type="application/rss+xml"/><item><title>Lame (Hack The Box) Full Write-Up</title><link>http://shellthisbox.io/posts/htb-machine-lame/</link><pubDate>Tue, 31 Mar 2026 12:01:35 +0300</pubDate><guid>http://shellthisbox.io/posts/htb-machine-lame/</guid><description>&lt;h2 id="introduction"&gt;Introduction:&lt;/h2&gt;
&lt;p&gt;Lame is the oldest retired Linux machine on the Hack The Box platform. It is rated easy and was originally released on March 14, 2017. In this walkthrough, I’ll use HTB’s Guided Mode to better understand the exploitation process step by step.&lt;/p&gt;
&lt;h2 id="attack-path-summary"&gt;Attack Path Summary&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Enumeration → Nmap reveals Samba 3.0.20&lt;/li&gt;
&lt;li&gt;Initial attempt → VSFTPD exploit (failed)&lt;/li&gt;
&lt;li&gt;Foothold → CVE-2007-2447 (Samba RCE)&lt;/li&gt;
&lt;li&gt;Privilege level → root access via exploit&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;&lt;code&gt;Target_IP&lt;/code&gt;: 10.129.12.112&lt;/p&gt;</description></item><item><title>Editor (Hack The Box) Full Write-Up</title><link>http://shellthisbox.io/posts/htb-machine-editor/</link><pubDate>Thu, 26 Mar 2026 12:01:35 +0300</pubDate><guid>http://shellthisbox.io/posts/htb-machine-editor/</guid><description>&lt;h2 id="introduction"&gt;Introduction:&lt;/h2&gt;
&lt;p&gt;This is my first write-up on this blog—and actually my first write-up ever. Hope you enjoy it.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Target_IP&lt;/code&gt;: 10.129.8.250&lt;/p&gt;
&lt;p&gt;The first step is to verify that the target host is reachable:&lt;/p&gt;
&lt;h2 id="enumeration"&gt;Enumeration:&lt;/h2&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-css" data-lang="css"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nt"&gt;ping&lt;/span&gt; &lt;span class="nt"&gt;Target_IP&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-shell" data-lang="shell"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;ping 10.129.8.250
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;PING 10.129.8.250 &lt;span class="o"&gt;(&lt;/span&gt;10.129.8.250&lt;span class="o"&gt;)&lt;/span&gt; 56&lt;span class="o"&gt;(&lt;/span&gt;84&lt;span class="o"&gt;)&lt;/span&gt; bytes of data.
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="m"&gt;64&lt;/span&gt; bytes from 10.129.8.250: &lt;span class="nv"&gt;icmp_seq&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;1&lt;/span&gt; &lt;span class="nv"&gt;ttl&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;63&lt;/span&gt; &lt;span class="nv"&gt;time&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;7.80 ms
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="m"&gt;64&lt;/span&gt; bytes from 10.129.8.250: &lt;span class="nv"&gt;icmp_seq&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;2&lt;/span&gt; &lt;span class="nv"&gt;ttl&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;63&lt;/span&gt; &lt;span class="nv"&gt;time&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;7.96 ms
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="m"&gt;64&lt;/span&gt; bytes from 10.129.8.250: &lt;span class="nv"&gt;icmp_seq&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;3&lt;/span&gt; &lt;span class="nv"&gt;ttl&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;63&lt;/span&gt; &lt;span class="nv"&gt;time&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;7.90 ms
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="m"&gt;64&lt;/span&gt; bytes from 10.129.8.250: &lt;span class="nv"&gt;icmp_seq&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;4&lt;/span&gt; &lt;span class="nv"&gt;ttl&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="m"&gt;63&lt;/span&gt; &lt;span class="nv"&gt;time&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;8.00 ms
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;^C
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;--- 10.129.8.250 ping statistics ---
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="m"&gt;4&lt;/span&gt; packets transmitted, &lt;span class="m"&gt;4&lt;/span&gt; received, 0% packet loss, &lt;span class="nb"&gt;time&lt;/span&gt; 3004ms
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;rtt min/avg/max/mdev &lt;span class="o"&gt;=&lt;/span&gt; 7.800/7.915/7.995/0.074 ms
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;A successful response confirms that the host is alive and accessible on the network.&lt;/p&gt;</description></item></channel></rss>