Lampião: 1 Vulnhub box Walkthrough

Lampião: 1 Vulnhub box Walkthrough

Hi there, This is gonna be a walkthrough on an intentionally vulnerable box for beginners who is just starting to practice on vulnerable boxes from vulnhub. ‘Lampião: 1’ is an intentionally vulnerable ubuntu machine created by ‘Tiago Tavares’ for beginners.

Before getting into the practice on boot2root. Let me tell you the requirments of starting practice on vulnerable machines. It’s good if you have kali linux installed on your system as primary OS or Virtual Machine will also be fine. I would recommend to have virtual box installed on you system which is absolutely free of cost. Now let’s download ‘Lampiao:1’ box from vulnhub website. Basically you get .vmdk file in a zipped folder which can be run in virtual box. Once downloaded, unzip the folder and you can see ‘Lampiao-disk1.vmdk’ file in the folder.

Now open virtualbox, you can see a ‘New’ button and top left corner, just click on it and go next until it takes you to finish. Once finished, you can see it in the left panel of virtualbox. Select that and click on settings button on top, go to network tab and choose ‘Bridged Adapter’ in ‘Attached to:’ section. Jump up to ‘Storage’ tab and under ‘Controller SCSI’ section you can see ‘Hard Disk:’ tab. You got to choose ‘.vmdk’ file there. So navigate to Lampiao folder and ‘Lampiao.vmdk’ file. That’s all, we are good to go. Let’s now start the vm and head up to our kali machine.

Lampiao is a vulnerable machine for beginners who is starting his/her career in hacking or penetration testing. In this box you have to find a flag and boot it to root. Let’s dive into it and see how can we own root.

Now fire up your kali machine and open up terminal to figure out the ip address of target machine using ‘netdiscover’ command(in my case it’s Let’s now start gathering some information about the target machine. Let’s scan the ports running on the machine first and for that we are gonna be using one of the best tools called ‘nmap’. In order to use nmap, open terminal and type ‘nmap -sV -p- ipaddress(in my case’. So basically we are asking nmap to scan all ports by giving ‘-p-‘ command and all the running services by giving ‘-sV’ command. Refer the screenshot.

meanwhile open up your browser and let’s check if this box is having any web application running on it. As we can see in screenshot, an application is running on port 80 but we can not find much on here.

Let’s have a look on nmap result. As you can see, there are three ports open 22,80 and 1898. We have already checked port 80 and we didn’t find anything good.

Let’s have a look what do we have on port 1898. Let’s try it in browser. As we can see, we have Drupal running on this port. We’ll see if we can find someting useful here.

As you can see the post which is submitted by someone called ‘tiago’. This can be one of the Users name and we can try connecting this user via ssh on port 22 as it’s opened. We got to have password this particular user in order to connect via ssh. Let’s have a look what do we have next.

Click on the hilighted part and let’s see what do we have there.

As you can see it redirects us to another page which seems to be having some history written about something or someone. We can find the password for the user, hidden somewhere in this post.

For that we are gonna be using an inbuilt tool in kali called ‘Cewl’ which will extract all the words in the particular page and we’ll get a wordlist so that we can use that for bruteforcing the user(tiago) that we have found. Use the hilighted command to do so. Basically we are extracting the words and saving it in a text file called ‘wordlist’ in /root/Desktop/Lampiao directory.

Let’s now try to bruteforce the user(tiago) on ssh using a tool called ‘THC-Hydra’. use the command ‘hydra -l tiago -P wordlist_directory ssh://target_ip_address’ to crack the password of ‘tiago’ user.

WOOHOO!!! We have found the password of the user(tiago).

Let’s now try to connect it using ssh. Use command ‘ssh tiago@target_ip_address(’ and paste the password that we have found using hydra.

Here we go…. We are able to connect via ssh. We have user(tiago) running on ssh.

We can now execute any linux command as its running ubuntu. But we don’t have anything here.

Let’s now check if we can run ‘wget’ command so that we can download and run some exploits on the machine. As you can see, we are able to do wget on the machine.

We are gonna be downloading ‘Linux Exploit Suggester’ and run it on target machine, which will show us the exploits available on the machine. We can download ‘Linux Exploit Suggester’ from ‘ -O’. Run the command as in screenshot that will download ‘Linux Exploit Suggester’ as ‘’.

Let’s now change the permission to execute the file. Use the ‘chmod’ command.

It’s time to run the file and see what are the exploits available for this machine. Use ‘./’ to see the exploits. There are plenty number of exploits available for this machine.

But we are gonna be using ‘dirtycow 2’ which will change the password of root by itself.

We have to download dirtycow 2 on the target machine and run. We are gonna be using ‘wget’ command again to download the exploit. The link to download exploit can be found in the exploit section itself.

It downloads 40847.cpp file which is a c++ program. Let’s now excute using g++. Refer the screenshot for command.

Once we execute the 40847.cpp file, we get another file(dcow) created. We can run it and this will change root password to ‘dirtyCowFun’.

Let’s now connect root using ssh and see if we can find our flag there. The root password is ‘dirtyCowFun’.

When we list the directory, we can find a file(flag.txt) which is our flag. Let’s open and see using ‘cat’ command. Here we go, we have our flag here…………..

Thanks for reading… Happy Hacking…..

Visit my website to read and learn a lot more.

Author face

Sunny Singh

Cyber Security Enthusiast

Recent post