🐧DC-2 - unfinished
192.168.129.194
Enumeration
Nmap scan
nmap -sV -p- 192.168.129.194 -A
Port 80
Running dirb against the site because it fails to go to port 80 at this IP.
Interesting error.

Added IP to host file as dc-2


Made word list with cewl
cewl http://dc-2 -w wordlist
Try to bruteforce the login for wp-login.php
hydra 192.168.129.194 http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In&redirect_to=http%3A%2F%2Fdc-2%2Fwp-admin%2F&testcookie=1:Error" -L wordlist -P wordlist -t 64
wpscan --url http://dc-2/ -U users.txt -P wordlist

Exploit
Document here:
Exploit used (link to exploit)
Explain how the exploit works against the service
Any modified code (and why you modified it)
Proof of exploit (screenshot of reverse shell with target IP address output)
Post-Exploit Enumeration
Current User
OS & Kernel
Users
Groups
Network
Processes
Services
Scheduled Tasks
Interesting Files
\
Privilege Escalation
Document here:
Exploit used (link to exploit)
Explain how the exploit works
Any modified code (and why you modified it)
Proof of privilege escalation (screenshot showing ip address and privileged username)\
Persistence
Document here how you set up persistence on the target
Flags
Shell
Root
Template partially from 0xC0FFEE https://notes.benheater.com
Last updated
Was this helpful?