Scanning and Enumeration
Scanning
kali@kali:~$ nmap -p 80 -sC -sV 10.10.10.88
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-29 09:25 EDT
Nmap scan report for 10.10.10.88
Host is up (0.083s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 5 disallowed entries
| /webservices/tar/tar/source/
| /webservices/monstra-3.0.4/ /webservices/easy-file-uploader/
|_/webservices/developmental/ /webservices/phpmyadmin/
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Landing Page
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.31 secondsEnumeration




Attempted password
attempted password of admin/admin

Found wp directory
WPScan
After conducting the scan, a found plugin was the gwolle-gb plugin.

Running a searchsploit we are able to find a Remote File Inclusion Vulnerability.
Further analyzation of the code looks like we need to create a reverse-shell and name it wp-load.php. After that we need to access it with the following link
Doing so should allow us to obtain a reverse shell.
Last updated
Was this helpful?