EVM: 1 Vulnhub Walkthrough
Penetration Methodologies:
- Finding IP
- Nmap
- Enumeration
- Browsing HTTP Service
- Directory Bruteforce using dirb
- Enumeration Using WPScan
- Password Bruteforce using WPScan
- Getting Login Credentials
- Exploitation
- Exploiting using Metasploit
- Getting a reverse connection
- Spawning a TTY Shell
- Enumeration for Root Credentials
- Privilege Escalation
- Getting Login Credentials
- Logging in as root
- Reading the Final Flag
Let's Breach:
First of all finding IP for the machine i use bridge connection.The IP of machine was 192.168.1.5
I quickly nmap the website found 80 open
Then i browse the server and found that apache default page and phpinfo()
Nothing interesting then i bruteforce the directory you can use gobuster and nikto also
While scan is complete i found a wordpress directory that leads me to an another website
Then i quickly browse the http://192.168.1.5/wordpress then i found the page didn't load and i scan the vulnerable plugin themes and usename
So , i got the username
Then i brutforce the password of username using wpscan
Now let's fireup the msfconsole to test the upload shell (To get reverse shell connection)
Then i edit the username password rhost and targeturi and then hit exploit (run)
Boom , i got the shell and the shell was www-data
Let's do a privilege escalation
There was a directory call root3r where ther was root credentials
Comments
Post a Comment