A walkthrough of the 'Blog' TryHackMe CTF box covering the full attack chain: network scanning with nmap, directory enumeration with gobuster, WordPress credential brute-forcing with wpscan, exploiting the WordPress 5.0 Crop-image Shell Upload vulnerability via Metasploit to gain a foothold, discovering database credentials in config files, and escalating privileges to root via a SUID binary at /usr/sbin/checker.

2m read timeFrom infosecwriteups.com
Post cover image

Sort: