(HTB) Tenten Walkthrough
Name: Tenten IP : 10.10.10.10 OS – linux VM Author: ch4p Writeup Author: Teck_K2 Nmap result In the target system only port 22 and 80 is open let's try to open it It’s a job portal site and powered by WordPress Let's try to find the version detail IN the /readme.html it’s showing me the version which is 4.7 Now as we now it’s a WordPress site now we will use wpscan It will start enumerating users We got only 1 user One of them is admin we will focus on him only Now we know the username we can try to bruteforce the password After several hours I got no result Let’s enumerate plugins We got 2 plugins installed As we can see one is akismet which is up to date and the second one is job-manger which is also up to date but one version of job manager which is 0.7.25 seems outdated and insecure. Let find out some exploit for that. I find this link in the wpscan description https://vagmour.eu/cve-2015-6668-cv-filename-disclosure-on-job-manager-wordpress-plugin/htt...