Cyber Security | Vulnhub | Blogger | WordPress Enumeration & Plugin Exploitation | Beginner
Автор: Junhua's Cyber Lab
Загружено: 2025-03-17
Просмотров: 150
Описание:
In this video, I take you through a beginner-level Vulnhub machine, explaining every step in great detail while summarizing a methodology for enumerating and exploiting WordPress. This guide is perfect for beginners looking to improve their penetration testing skills.
Walkthrough Steps:
🔹 Step 1: Perform directory enumeration using gobuster to uncover hidden directories.
🔹 Step 2: Manually locate a WordPress installation within a subdirectory.
🔹 Step 3: Conduct WordPress enumeration to gather information about users and plugins.
🔹 Step 4: Generate a custom wordlist using cewl, but encounter difficulties cracking passwords with both custom and rockyou.txt wordlists.
🔹 Step 5: Perform comprehensive enumeration to discover a vulnerable plugin—Discuz.
🔹 Step 6: Exploit the Discuz plugin vulnerability using both Python scripts and Metasploit to gain access.
This walkthrough not only shows how to exploit WordPress but also highlights common challenges and troubleshooting techniques.
💻 Tools Used: Gobuster, Cewl, WordPress Enumeration, Python, Metasploit
🎯 Goal: Discover, enumerate, and exploit WordPress vulnerabilities to gain access
🔒 Ethical hacking only—always use these techniques responsibly!
If you found this helpful, don’t forget to like, share, and subscribe for more cybersecurity and CTF content!
Machine Info:
~ Pentesting Lab Exercises Series - Vulnhub
~ Virtual Machine Name: blogger: 1
~ Link: https://www.vulnhub.com/entry/blogger...
#Vulnhub #CTF #WordPress #EthicalHacking #Cybersecurity #Pentesting #Metasploit #Python #BugBounty #ExploitDevelopment
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: