, ,

EVM: 1



  • Directory enumeration will lead to a wordpress site
  • WPScan the site to gain creds
  • Use metasploit to gian wp admin access
  • Search for hidden files to find the password for the root user


Run nmap scan to find for open ports.

Run a gobuster scan to find for hidden directories.

Port 80

Unable to load the wordpress site.

Let’s use WPscan to enumerate.

Username: c0rrupt3d_brain, Password: 24992499

Since I cant load the WordPress site I’ll use metasploit to see if I can gain access.

Set up the options.


A shell is gained.

Head to the home folder and check the directory. Search for hidden files and there will be the root password.

Privilege escalation

Found the final flag.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Comments (



%d bloggers like this: