githubEdit

Wordpress

1) Scan Wordpress for general information

wpscan --url http://domain.local/wordpress

2) Enumerate users

wpscan --url http://domain.local/wordpress --enumerate u

3) Enumerate all plugins

wpscan --url http://domain.local/wordpress --plugins-detection aggressive

4) Password Attack

wpscan --url http://domain.local/wordpress --usernames USER --passwords /usr/share/wordlist/rockyou.txt

5) Enumerate themes

wpscan --url http://domain.local/wordpress --enumerate t

Admin panel RCE (Requires Credentials)

1) Edit 404.php on Wordpress Theme Editor

Go to:

Choose the 404.php file and replace it with a PHP reverse shell.

Trigger the 404 file to run your shell

Theme can be different

Alternate method: Metasploit

Enter appropriate information, then run.

2) Malicious Plugin Installation

Go to:

Compress your PHP reverse shell as a .zip file

Upload the .zip plugin

On plugin menu, click activate the newly installed plugin to execute and get a shell

OR

Go to uploads directory and get your reverse shell

Alternate Method

Go to:

Select install/upload and use your PHP reverse shell

If it asks you for FTP credentials and has FTP enabled, insert credentials and 127.0.0.1 hostname

Go to media -> select our file -> Go to the presented URL that the file resides

Configuration files that might contain credentials

1) wp-config.php

Last updated