WordPress Attacks & Exploitation
Overview
Prerequisites
Authentication Attacks
Login Brute Force with WPScan
XML-RPC Method (Preferred)
Traditional wp-login Method
Targeted User Attack
Manual Brute Force Techniques
Custom Login Attack Scripts
Hydra Integration
Code Execution Techniques
Theme Editor Exploitation
Step 1: Administrative Access Required
Step 2: Theme Selection Strategy
Step 3: Web Shell Injection
Step 4: Web Shell Access
Reverse Shell Establishment
PHP Reverse Shell
Netcat Listener Setup
Metasploit Exploitation
wp_admin_shell_upload Module
Module Configuration
Module Options Verification
Exploitation Execution
Meterpreter Post-Exploitation
System Information Gathering
File System Exploration
Plugin Vulnerability Exploitation
mail-masta Plugin LFI
Vulnerability Analysis
Local File Inclusion Exploitation
WordPress Configuration Disclosure
Log Poisoning Attack
wpDiscuz Plugin RCE
Vulnerability Overview
Automated Exploitation
Manual Web Shell Access
Advanced Attack Techniques
WordPress Core Exploits
Version-Specific Attacks
XML-RPC Abuse
Database Access Exploitation
wp-config.php Credentials
WordPress Database Manipulation
Post-Exploitation Activities
Persistence Mechanisms
Web Shell Maintenance
User Account Creation
Data Extraction
Sensitive File Collection
WordPress-Specific Intelligence
HTB Academy Lab Solutions
Lab 1: User Enumeration
Lab 2: Password Brute Force
Lab 3: System User Discovery
Lab 4: Code Execution and Flag Retrieval
Security Cleanup & Artifacts
Post-Engagement Cleanup
Files to Remove
Log Evidence
Report Documentation
Testing Artifacts to Document
Defensive Recommendations
Immediate Actions
Security Hardening
Next Steps
Last updated