Shield

Personal Rating: Easy

Enumeration

Running the initial nmap scan revealed two open ports:

sudo nmap -v <IP>

Discovered open port 3306/tcp on 10.10.10.29
Discovered open port 80/tcp on 10.10.10.29

It was a wordpress site. I found http://10.10.10.29/wordpress/wp-admin/

I attempted injections with sqlmap, fuzzed the site with dirb and ran more nmap scans, not knowing yet how to properly enumerate wordpress specifically.

Password Guessing

After checking the walkthrough since I got stuck, I knew that the password of another Box was needed to log into the wordpress admin portal, which was very disappointing. So realistically, the only way would be bruteforce here.

Later I learned about Wordpress enumeration and exploits, which might also have worked here.

Last updated