Vulnhub Fsoft Hacking Challenges
Vulnhub Fsoft Hacking Challenges
Vulnhub Fsoft Hacking Challenges Walkthrough
We start by scanning the host with nmap
Nmap –A –T4 –p- 192.168.1.7
Running dirb on the host there is a robot file inside of it some directories we can try
The path http://192.168.1.7/blog/ is running WordPress, now lets enumerate the users on the service
wpscan –url http://192.168.1.7/blog/ -e u
There is a backup path were have some files were we can download, one of them is a php page with some information of sql database were are a username – password – database name
The pathhttp://192.168.1.7/assets/adminer.php we can use these credentials in this page as:
Got it and now we can go through the database, I found the admin and fs0ft username and some passwords.
Now we need to add the host name of WordPress to our hosts file
Now we go to http://fsoft.hacking/blog/wp-login.php and login using username fs0ft and password fs0f@2020!@
Now all we need to do is go to Media and upload a php shell there, you may get that the file is not going to be uploaded and may not be viewed, but to make sure it’s there you can go to http://192.168.1.7/blog/wp-content/uploads and you will see it there.
Breaking from shell jail by python3 -c ‘import pty;pty.spawn(“/bin/bash”)’
Then running find / -perm -u=s -type f 2>/dev/null to find writable files by the owner.

















Nhận xét
Đăng nhận xét