Scanning and Enumeration

Scanning

kali@kali:~$ nmap -p 80 -sC -sV 10.10.10.88
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-29 09:25 EDT
Nmap scan report for 10.10.10.88
Host is up (0.083s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 5 disallowed entries 
| /webservices/tar/tar/source/ 
| /webservices/monstra-3.0.4/ /webservices/easy-file-uploader/ 
|_/webservices/developmental/ /webservices/phpmyadmin/
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Landing Page

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.31 seconds

Enumeration

Attempted password

attempted password of admin/admin

Found wp directory

WPScan

After conducting the scan, a found plugin was the gwolle-gb plugin.

Running a searchsploit we are able to find a Remote File Inclusion Vulnerability.

Further analyzation of the code looks like we need to create a reverse-shell and name it wp-load.php. After that we need to access it with the following link

Doing so should allow us to obtain a reverse shell.

Last updated

Was this helpful?