Please enable JavaScript.
Coggle requires JavaScript to display documents.
E-Vuln, Users, Privilege Escalation - Coggle Diagram
E-Vuln
Wordpress :check:
XML RPC
https://0xdf.gitlab.io/2022/02/03/htb-pressed.html
Reverse Shell
https://www.hackingarticles.in/wordpress-reverse-shell/
https://wordpress.stackexchange.com/questions/263008/wordpress-incorrectly-redirects-to-local-ip-address
BruteForce with XMLRPC
This can't be done since the xmlrpc is not working while captcha is on
XMLRPC to bruteforce
X-Forwarded-For with random ip can be used to bypass the user attempts limit
Demo Website loaded
Changed the logo and the company name :check:
add some random posts
https://www.bleepingcomputer.com/news/security/toyota-discloses-data-leak-after-access-key-exposed-on-github/
https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/
FTP :red_cross:
Anonymous Login :check:
CVE-2011-2523 Backdoor Command Execution as
tech
:check:
Port: 2121 | Hide from normal Nmap :red_cross:
SMTP :red_cross:
https://crimsonglow.ca/~kjiwa/2016/06/exploiting-apache-james-2.3.2.html
https://infosecwriteups.com/hackthebox-solidstate-medium-writeup-2d655949ac86
Moodle :red_cross:
https://blog.sonarsource.com/moodle-remote-code-execution/?redirect=rips
https://0xdf.gitlab.io/2021/09/11/htb-schooled.html
Stored XSS via moodlenetprofile parameter in user profile
Note Taking App :red_cross:
https://github.com/TFNS/writeups/tree/master/2020-04-12-ByteBanditsCTF/notes-app/sources/
https://www.youtube.com/watch?v=8_J2eixzWF8
Github :red_cross:
SSH :check:
Nginx :red_cross:
MySQL :red_cross:
Jira :red_cross:
Users
root
tech
evuln
normal
Privilege Escalation
CronJob