Wordpress: CVE-2021-29447
Room Link: https://tryhackme.com/r/room/obscured
Scans
Initial scan
Kali
nmap -A $VICTIM
Longer scan
Kali

TCP/80 - HTTP
Scan wordpress site
We can see wordpress version 5.6.2 is running
Kali

We are given the credentials for this box.

Kali
NAMEEVIL.dtd
Start the an http server in the same directory as the dtd file and then upload payload.wav to Wordpress.
Kali

Create a php file that base64 decodes the output from above
decode.php
Kali

Now lets do the same thing but get wp-config.php file
NAMEEVIL.dtd
Kali

decode.php
Kali

TCP/3306 - SQL
Kali
Kali(mysql)

Kali

Kali

Initial Shell
Login again into WordPress using the credentials found
Kali
Edit IP variable
Kali
Update the page with your reverse shell then save. This will make the plugin not appear anymore under Installed Plugins

Curl the page to activate it.
Kali

Victim
Last updated