A walkthrough of the 'Blog' TryHackMe CTF box covering the full attack chain: network scanning with nmap, directory enumeration with gobuster, WordPress credential brute-forcing with wpscan, exploiting the WordPress 5.0 Crop-image Shell Upload vulnerability via Metasploit to gain a foothold, discovering database credentials in
Sort: