Shield
Personal Rating: Easy
Last updated
Personal Rating: Easy
Last updated
Running the initial nmap scan revealed two open ports:
sudo nmap -v <IP>
It was a wordpress site. I found
I attempted injections with sqlmap, fuzzed the site with dirb and ran more nmap scans, not knowing yet how to properly enumerate wordpress specifically.
After checking the walkthrough since I got stuck, I knew that the password of another Box was needed to log into the wordpress admin portal, which was very disappointing. So realistically, the only way would be bruteforce here.
Later I learned about Wordpress enumeration and exploits, which might also have worked here.