Vulnhub Fsoft Hacking Challenges
Vulnhub Fsoft Hacking Challenges Vulnhub Fsoft Hacking Challenges Walkthrough We start by scanning the host with nmap Nmap –A –T4 –p- 192.168.1.7 Running dirb on the host there is a robot file inside of it some directories we can try The path http://192.168.1.7/blog/ is running WordPress, now lets enumerate the users on the service wpscan –url http://192.168.1.7/blog/ -e u There is a backup path were have some files were we can download, one of them is a php page with some information of sql database were are a username – password – database name The pathhttp://192.168.1.7/assets/ adminer.php we can use these credentials in this page as: Got it and now we can go through the database, I found the admin and fs0ft username and some passwords. Now we need to add the host name of WordPress to our hosts file Now we go to http://fsoft.hacking/blog/wp-login.php and login using username fs0ft and ...