DC-2 - unfinished
Last updated
Was this helpful?
Last updated
Was this helpful?
192.168.129.194
Nmap scan
Running dirb against the site because it fails to go to port 80 at this IP.
Interesting error.
Added IP to host file as dc-2
Made word list with cewl
Try to bruteforce the login for wp-login.php
Document here:
Exploit used (link to exploit)
Explain how the exploit works against the service
Any modified code (and why you modified it)
Proof of exploit (screenshot of reverse shell with target IP address output)
\
Document here:
Exploit used (link to exploit)
Explain how the exploit works
Any modified code (and why you modified it)
Proof of privilege escalation (screenshot showing ip address and privileged username)\
Document here how you set up persistence on the target
Template partially from 0xC0FFEE https://notes.benheater.com