ColddBox: Easy
Last updated
Last updated
Upon obtaining an IP address, my initial step involves conducting a comprehensive scan of the targeted machine for open ports, employing both rustscan
and nmap
.
Subsequently, I focus on the HTTP port, seeking potential vulnerabilities in the system.
In the context of a WordPress
website, once I complete the enumeration of files and directories, I come across something noteworthy.
Upon attempting to log in as the user c0ldd
, I receive an error that serves as confirmation of the user's existence. Interestingly, I encounter the same error when trying to log in as both hugo
and philip.
I use wpscan
to brute force this credentials.
Obtaining root access seems surprisingly straightforward in this case.
Following successful access to the website, I employ a reverse shell to establish control over the machine. Utilizing a text editor, I modify a file and insert a reverse shell obtained from the GitHub repository.