Htb Academy Public Exploits

amin bouloujouramin bouloujour
1 min read

Starting with running nmap to scan the target

Scanning the 22 ssh port to get more infos about it

Cool now we do have some solid infos like the version so why not searching for public exploits for this version if there is any

nothing here let’s try something else, after navigating to the ip:port of the target we found out its a webserver built in with wordpress why not then scanning it using nmap

WordPress 5.6.1 seems intresting, why not searching it

started msf and searched for these exploits no one been found, searched on web especially in https://wpscan.com/wordpress/561/ no one is usefull for my case, here i started getting lost then i tried a new way, after that i saw on the website a body this bakcup plugin 2.7.10 for wordpress, finally a starting point that i didn’t notice from first, let’s then search it on msf

let’s configure the exploit

finally we found the flag, just wanna point to another way for doing that, a python script from Venexy: https://www.exploit-db.com/exploits/51937

0
Subscribe to my newsletter

Read articles from amin bouloujour directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

amin bouloujour
amin bouloujour