Scanning [Initial-Access]
We came to know that website using WordPress in background. Let's try to find out the plugin involved in that.
wpscan --url http://$nukem --api-token <You_Token>

I found one plugin having RCE.
I will run this.

I have copied the exploit and also gathered php backdoor file which will be needed while running the exploit.
Now, I have downloaded the image file and then saved it in the image.jpg file name.
Running exploit.
Doesn't work at one go.

At first, it didn't work just it said that the plugin version was vulnerable.
Other exploit.

Change IP and port at line number 36.
Didn't work.
Other exploit {Worked }
This exploit was suggested with the wpscan result.
Saving the file content in Simple_File_list_exploit.py
Now runing the file.
It requires URL.


After reviewing the payload content, it is clear that we need to pass POST data with the password to execute commands. For example:

Working !!!
Let's Get the reverse shell from this.
Unable to get the reverse shell as both the system is not connected with each other.

I changed the payload to a reverse shell.
Add Payload to cheat sheet

Start a listener at port 80 and run the command.
Run the payload again.


Got the shell.
Last updated
Was this helpful?