EVM: 1 Vulnhub Walkthrough

Penetration Methodologies:

  • Finding IP
    • Nmap
  • Enumeration
    • Browsing HTTP Service
    • Directory Bruteforce using dirb
    • Enumeration Using WPScan
    • Password Bruteforce using WPScan
    • Getting Login Credentials
  • Exploitation
    • Exploiting using Metasploit 
    • Getting a reverse connection 
    • Spawning a TTY Shell
    •  Enumeration for Root Credentials
  • Privilege Escalation 
    • Getting Login Credentials
    • Logging in as root
    • Reading the Final Flag

Let's Breach:
    First of all finding IP for the machine i use bridge connection.The IP of machine was 192.168.1.5



I quickly nmap the website found 80 open

Then i browse the server and found that apache default page and phpinfo()


Nothing interesting then i bruteforce the directory you can use gobuster and nikto also
While scan is complete i found a wordpress directory that leads me to an another website

Then i quickly browse the http://192.168.1.5/wordpress then i found the page didn't load and i scan the vulnerable plugin themes and usename





So , i got the username



Then i brutforce the password of username using wpscan


Now let's fireup the msfconsole to test the upload shell (To get reverse shell connection)



Then i edit the username password rhost and targeturi and then hit exploit (run)


Boom , i got the shell and the shell was www-data

Let's do a privilege escalation 


There was a directory call root3r where ther was root credentials


Then i use that credentials to gain root shell



Voila, i got into root

Happy Hacking :)















Comments

Popular posts from this blog

Wordpress Reverse Shell

SAR1 VULHUB WALKTHROUGH